Skip to content

Commit afb32bd

Browse files
jasnowRubySec CI
authored andcommitted
Updated advisory posts against rubysec/ruby-advisory-db@01befbb
1 parent 9fdab4d commit afb32bd

File tree

3 files changed

+30
-0
lines changed

3 files changed

+30
-0
lines changed

advisories/_posts/2013-02-25-OSVDB-114854.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,4 +32,5 @@ advisory:
3232
- https://security.snyk.io/vuln/SNYK-RUBY-ACTIVERECORDJDBCADAPTER-20076
3333
- https://my.diffend.io/gems/activerecord-jdbc-adapter/1.2.5/1.2.8
3434
- http://osvdb.org/show/osvdb/114854
35+
- https://advisories.gitlab.com/pkg/gem/activerecord-jdbc-adapter/OSVDB-2013-02-25
3536
---
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
---
2+
layout: advisory
3+
title: 'OSVDB-112347 (activejob): Active Job - Object injection security vulnerability
4+
if Global IDs'
5+
comments: false
6+
categories:
7+
- activejob
8+
advisory:
9+
gem: activejob
10+
osvdb: 112347
11+
url: https://advisories.gitlab.com/pkg/gem/activejob/OSVDB-112347
12+
title: Active Job - Object injection security vulnerability if Global IDs
13+
date: 2014-09-29
14+
description: |
15+
* In release post: "Active Job vulnerability:
16+
We also fixed an Active Job bug that allowed String
17+
arguments to be deserialized as if they were Global IDs,
18+
an object injection security vulnerability.
19+
patched_versions:
20+
- ">= 4.2.0.beta2"
21+
related:
22+
url:
23+
- https://rubyonrails.org/2014/9/29/Rails-4-2-0-beta2-has-been-released
24+
- https://advisories.gitlab.com/pkg/gem/activejob/OSVDB-112347
25+
notes: "- No CVE, GHSA, or CVSS values\n"
26+
---

advisories/_posts/2016-12-21-CVE-2016-10522.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,9 @@ advisory:
2424
- ">= 1.1.1"
2525
related:
2626
url:
27+
- https://nvd.nist.gov/vuln/detail/CVE-2016-10522
2728
- https://www.sourceclear.com/registry/security/cross-site-request-forgery-csrf-/ruby/sid-3173
2829
- https://github.com/sferik/rails_admin/commit/b13e879eb93b661204e9fb5e55f7afa4f397537a
30+
- https://advisories.gitlab.com/pkg/gem/rails_admin/SRCCLR-SID-3173
31+
- https://github.com/advisories/GHSA-pxqr-8v54-m2hj
2932
---

0 commit comments

Comments
 (0)