class Brakeman::CheckJSONEncoding

Public Instance Methods

has_workaround?() click to toggle source
# File lib/brakeman/checks/check_json_encoding.rb, line 33
def has_workaround?
  workaround = s(:module, :ActiveSupport,
                 s(:module, :JSON,
                   s(:module, :Encoding,
                     s(:call, nil, :private),
                     s(:class, :EscapedString, nil,
                       s(:defn, :to_s,
                         s(:args),
                         s(:self))))))

  tracker.initializers.any? do |_name, initializer|
    initializer == workaround
  end
end
run_check() click to toggle source
# File lib/brakeman/checks/check_json_encoding.rb, line 8
def run_check
  if (version_between? "4.1.0", "4.1.10" or version_between? "4.2.0", "4.2.1") and not has_workaround?
    message = msg(msg_version(rails_version), " does not encode JSON keys ", msg_cve("CVE-2015-3226"), ". Upgrade to ")

    if version_between? "4.1.0", "4.1.10"
      message << msg_version("4.1.11")
    else
      message << msg_version("4.2.2")
    end

    if tracker.find_call(:methods => [:to_json, :encode]).any?
      confidence = :high
    else
      confidence = :medium
    end

    warn :warning_type => "Cross-Site Scripting",
      :warning_code => :CVE_2015_3226,
      :message => message,
      :confidence => confidence,
      :gem_info => gemfile_or_environment,
      :link_path => "https://groups.google.com/d/msg/rubyonrails-security/7VlB_pck3hU/3QZrGIaQW6cJ"
  end
end