The Ruby Advisory Database aims to compile all advisories that are relevant to Ruby libraries.
- Provide advisory metadata in a simple yet structured YAML schema for automated tools to consume.
- Avoid reinventing CVEs.
- Avoid duplicating the efforts of the OSVDB.
The database is a list of directories that match the names of Ruby libraries on rubygems.org. Within each directory are one or more advisory files for the Ruby library. These advisory files are typically named using the advisories CVE identifier number.
gems/:
actionpack/:
CVE-2012-1099.yml CVE-2012-3463.yml CVE-2013-0156.yml
CVE-2013-1857.yml CVE-2012-3424.yml CVE-2012-3465.yml
CVE-2013-1855.yml
If an advisory does not yet have a CVE, requesting a CVE is easy.
Each advisory file contains the advisory information in YAML format:
---
gem: actionpack
framework: rails
cve: 2013-0156
osvdb: 89026
url: http://osvdb.org/show/osvdb/89026
title: |
Ruby on Rails params_parser.rb Action Pack Type Casting Parameter Parsing
Remote Code Execution
description: |
Ruby on Rails contains a flaw in params_parser.rb of the Action Pack.
The issue is triggered when a type casting error occurs during the parsing
of parameters. This may allow a remote attacker to potentially execute
arbitrary code.
cvss_v2: 10.0
patched_versions:
- ~> 2.3.15
- ~> 3.0.19
- ~> 3.1.10
- ">= 3.2.11"
gem
[String]: Name of the affected gem.framework
[String] (optional): Name of framework gem belongs to.platform
[String] (optional): If this vulnerability is platform-specific, name of platform this vulnerability affects (e.g. JRuby)cve
[String]: CVE id.osvdb
[Fixnum]: OSVDB id.url
[String]: The URL to the full advisory.title
[String]: The title of the advisory.date
[Date]: Disclosure date of the advisory.description
[String]: Multi-paragraph description of the vulnerability.cvss_v2
[Float]: The CVSSv2 score for the vulnerability.unaffected_versions
[Array<String>] (optional): The version requirements for the unaffected versions of the Ruby library.patched_versions
[Array<String>]: The version requirements for the patched versions of the Ruby library.
Please see CONTRIBUTORS.md.
This database also includes data from the Open Source Vulnerability Database developed by the Open Security Foundation (OSF) and its contributors.