Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
李少辉-开发者
Brakeman
提交
63a42f1b
B
Brakeman
项目概览
李少辉-开发者
/
Brakeman
通知
1
Star
0
Fork
0
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
B
Brakeman
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
前往新版Gitcode,体验更适合开发者的 AI 搜索 >>
提交
63a42f1b
编写于
4月 12, 2014
作者:
J
Justin
浏览文件
操作
浏览文件
下载
差异文件
Merge pull request #472 from presidentbeef/fix_chained_calls_in_single_line_scopes
Fix checking chained SQL calls in scopes
上级
fdfdd806
c893854e
变更
3
隐藏空白更改
内联
并排
Showing
3 changed file
with
22 addition
and
4 deletion
+22
-4
lib/brakeman/checks/check_sql.rb
lib/brakeman/checks/check_sql.rb
+7
-3
test/apps/rails4/app/models/user.rb
test/apps/rails4/app/models/user.rb
+2
-0
test/tests/rails4.rb
test/tests/rails4.rb
+13
-1
未找到文件。
lib/brakeman/checks/check_sql.rb
浏览文件 @
63a42f1b
...
...
@@ -65,7 +65,7 @@ class Brakeman::CheckSQL < Brakeman::BaseCheck
call
=
make_call
(
nil
,
:named_scope
,
args
).
line
(
args
.
line
)
scope_calls
<<
scope_call_hash
(
call
,
name
,
:named_scope
)
end
elsif
version_between?
(
"3.1.0"
,
"
3
.9.9"
)
elsif
version_between?
(
"3.1.0"
,
"
4
.9.9"
)
ar_scope_calls
(
:scope
)
do
|
name
,
args
|
second_arg
=
args
[
2
]
next
unless
sexp?
second_arg
...
...
@@ -114,8 +114,12 @@ class Brakeman::CheckSQL < Brakeman::BaseCheck
find_calls
.
process_source
(
block
,
:class
=>
model_name
,
:method
=>
scope_name
)
find_calls
.
calls
.
each
{
|
call
|
process_result
(
call
)
if
@sql_targets
.
include?
(
call
[
:method
])
}
elsif
block
.
node_type
==
:call
process_result
:target
=>
block
.
target
,
:method
=>
block
.
method
,
:call
=>
block
,
:location
=>
{
:type
=>
:class
,
:class
=>
model_name
,
:method
=>
scope_name
}
while
call?
block
process_result
:target
=>
block
.
target
,
:method
=>
block
.
method
,
:call
=>
block
,
:location
=>
{
:type
=>
:class
,
:class
=>
model_name
,
:method
=>
scope_name
}
block
=
block
.
target
end
end
end
...
...
test/apps/rails4/app/models/user.rb
浏览文件 @
63a42f1b
...
...
@@ -2,4 +2,6 @@ class User < ActiveRecord::Base
def
test_sql_sanitize
(
x
)
self
.
select
(
"
#{
sanitize
(
x
)
}
"
)
end
scope
:hits_by_ip
,
->
(
ip
,
col
=
"*"
)
{
select
(
"
#{
col
}
"
).
order
(
"id DESC"
)
}
end
test/tests/rails4.rb
浏览文件 @
63a42f1b
...
...
@@ -15,7 +15,7 @@ class Rails4Tests < Test::Unit::TestCase
:controller
=>
0
,
:model
=>
1
,
:template
=>
2
,
:generic
=>
2
1
:generic
=>
2
2
}
end
...
...
@@ -270,6 +270,18 @@ class Rails4Tests < Test::Unit::TestCase
:user_input
=>
s
(
:call
,
nil
,
:sanitize
,
s
(
:lvar
,
:x
))
end
def
test_sql_injection_chained_call_in_scope
assert_warning
:type
=>
:warning
,
:warning_code
=>
0
,
:fingerprint
=>
"aa073ab210f9f4a800b5595241a6274656d37087a4f433d4b596516e1227d91b"
,
:warning_type
=>
"SQL Injection"
,
:line
=>
6
,
:message
=>
/^Possible\ SQL\ injection/
,
:confidence
=>
1
,
:relative_path
=>
"app/models/user.rb"
,
:user_input
=>
s
(
:lvar
,
:col
)
end
def
test_i18n_xss_CVE_2013_4491_workaround
assert_no_warning
:type
=>
:warning
,
:warning_code
=>
63
,
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录