forked from presidentbeef/brakeman
-
Notifications
You must be signed in to change notification settings - Fork 0
/
WARNING_TYPES
69 lines (35 loc) · 3.27 KB
/
WARNING_TYPES
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
This file describes the various warning types reported by this tool.
# Cross Site Scripting
Cross site scripting warnings are raised when a parameter or model attribute is output through a view without being escaped.
See http://guides.rubyonrails.org/security.html#cross-site-scripting-xss for details.
# SQL Injection
String interpolation or concatenation has been detected in an SQL query. Use parameterized queries instead.
See http://guides.rubyonrails.org/security.html#sql-injection for details.
# Command Injection
Request parameters or string interpolation has been detected in a `system` call. This can lead to someone executing arbitrary commands. Use the safe form of `system` instead, which will pass in arguments safely.
See http://guides.rubyonrails.org/security.html#command-line-injection for details.
# Mass Assignment
Mass assignment is a method for initializing models. If the attributes which are set is not restricted, someone may set the attributes to any value they wish.
Mass assignment can be disabled globally.
Please see http://railspikes.com/2008/9/22/is-your-rails-application-safe-from-mass-assignment for more details.
# Attribute Restriction
This warning comes up if a model does not limit what attributes can be set through mass assignment.
In particular, this check looks for `attr_accessible` inside model definitions. If it is not found, this warning will be issued.
Note that disabling mass assignment globally will suppress these warnings.
# Cross-Site Request Forgery
No call to `protect_from_forgery` was found in `ApplicationController`. This method prevents CSRF.
See http://guides.rubyonrails.org/security.html#cross-site-request-forgery-csrf for details.
# Redirect
Redirects which rely on user-supplied values can be used to "spoof" websites or hide malicious links in otherwise harmless-looking URLs. They can also allow access to restricted areas of a site if the destination is not validated.
This warning is shown when request parameters are used inside a call to `redirect_to`.
See http://www.owasp.org/index.php/Top_10_2010-A10 for more information.
# Default Routes
The general default routes warning means there is a call to `map.connect ":controller/:action/:id"` in config/routes.rb. This allows any public method on any controller to be called as an action.
If this warning is reported for a particular controller, it means there is a route to that controller containing `:action`.
Default routes can be dangerous if methods are made public which are not intended to be used as URLs or actions.
# Format Validation
Calls to `validates_format_of ..., :with => //` which do not use `\A` and `\z` as anchors will cause this warning. Using `^` and `$` is not sufficient, as `$` will only match up to a new line. This allows an attacker to put whatever malicious input they would like after a new line character.
See http://guides.rubyonrails.org/security.html#regular-expressions for details.
# Dynamic Render Path
When a call to `render` uses a dynamically generated path, template name, file name, or action, there is the possibility that a user can access templates that should be restricted. The issue may be worse if those templates execute code or modify the database.
This warning is shown whenever the path to be rendered is not a static string or symbol.