Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
李少辉-开发者
Brakeman
提交
94fd4fb6
B
Brakeman
项目概览
李少辉-开发者
/
Brakeman
通知
1
Star
0
Fork
0
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
B
Brakeman
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
前往新版Gitcode,体验更适合开发者的 AI 搜索 >>
提交
94fd4fb6
编写于
9月 28, 2012
作者:
J
Justin
浏览文件
操作
浏览文件
下载
差异文件
Merge pull request #154 from oreoshake/check_for_overwritten_initializer
Check for overridden initializer values
上级
5004d3ad
15601d06
变更
5
隐藏空白更改
内联
并排
Showing
5 changed file
with
23 addition
and
8 deletion
+23
-8
lib/brakeman/checks/check_cross_site_scripting.rb
lib/brakeman/checks/check_cross_site_scripting.rb
+8
-7
test/apps/rails3.1/app/views/users/json_test.html.erb
test/apps/rails3.1/app/views/users/json_test.html.erb
+1
-0
test/apps/rails3.1/config/initializers/set_escape_json.rb
test/apps/rails3.1/config/initializers/set_escape_json.rb
+2
-0
test/apps/rails3.1/config/initializers/unset_escape_json.rb
test/apps/rails3.1/config/initializers/unset_escape_json.rb
+2
-0
test/tests/test_rails31.rb
test/tests/test_rails31.rb
+10
-1
未找到文件。
lib/brakeman/checks/check_cross_site_scripting.rb
浏览文件 @
94fd4fb6
...
...
@@ -31,7 +31,7 @@ class Brakeman::CheckCrossSiteScripting < Brakeman::BaseCheck
CGI
=
Sexp
.
new
(
:const
,
:CGI
)
FORM_BUILDER
=
Sexp
.
new
(
:call
,
Sexp
.
new
(
:const
,
:FormBuilder
),
:new
,
Sexp
.
new
(
:arglist
))
FORM_BUILDER
=
Sexp
.
new
(
:call
,
Sexp
.
new
(
:const
,
:FormBuilder
),
:new
,
Sexp
.
new
(
:arglist
))
#Run check
def
run_check
...
...
@@ -58,8 +58,9 @@ class Brakeman::CheckCrossSiteScripting < Brakeman::BaseCheck
@known_dangerous
<<
:strip_tags
end
matches
=
tracker
.
check_initializers
:ActiveSupport
,
:escape_html_entities_in_json
=
json_escape_on
=
matches
.
detect
{
|
result
|
true
?
result
[
-
1
].
first_arg
}
json_escape_on
=
false
initializers
=
tracker
.
check_initializers
:ActiveSupport
,
:escape_html_entities_in_json
=
initializers
.
each
{
|
result
|
json_escape_on
=
true
?
(
result
[
-
1
].
first_arg
)
}
if
!
json_escape_on
or
version_between?
"0.0.0"
,
"2.0.99"
@known_dangerous
<<
:
to_json
...
...
@@ -107,7 +108,7 @@ class Brakeman::CheckCrossSiteScripting < Brakeman::BaseCheck
message
=
"Unescaped user input value"
end
warn
:template
=>
@current_template
,
warn
:template
=>
@current_template
,
:warning_type
=>
"Cross Site Scripting"
,
:message
=>
message
,
:code
=>
input
.
match
,
...
...
@@ -128,13 +129,13 @@ class Brakeman::CheckCrossSiteScripting < Brakeman::BaseCheck
message
=
"Unescaped model attribute"
link_path
=
"cross_site_scripting"
if
node_type?
(
out
,
:call
,
:attrasgn
)
&&
out
.
method
==
:to_json
message
+=
" in JSON hash"
message
+=
" in JSON hash"
link_path
+=
"_to_json"
end
code
=
find_chain
out
,
match
warn
:template
=>
@current_template
,
:warning_type
=>
"Cross Site Scripting"
,
:warning_type
=>
"Cross Site Scripting"
,
:message
=>
message
,
:code
=>
code
,
:confidence
=>
confidence
,
...
...
@@ -203,7 +204,7 @@ class Brakeman::CheckCrossSiteScripting < Brakeman::BaseCheck
end
warn
:template
=>
@current_template
,
:warning_type
=>
"Cross Site Scripting"
,
:warning_type
=>
"Cross Site Scripting"
,
:message
=>
message
,
:code
=>
exp
,
:user_input
=>
@matched
.
match
,
...
...
test/apps/rails3.1/app/views/users/json_test.html.erb
0 → 100644
浏览文件 @
94fd4fb6
<%=
raw
({
:donkey
=>
params
[
:donkey
]}.
to_json
)
%>
\ No newline at end of file
test/apps/rails3.1/config/initializers/set_escape_json.rb
0 → 100644
浏览文件 @
94fd4fb6
# this value will be overwritten in unset_escape_json.rb
ActiveSupport
.
escape_html_entities_in_json
=
true
test/apps/rails3.1/config/initializers/unset_escape_json.rb
0 → 100644
浏览文件 @
94fd4fb6
# this overwrites the value set in set_escape_json
ActiveSupport
.
escape_html_entities_in_json
=
false
\ No newline at end of file
test/tests/test_rails31.rb
浏览文件 @
94fd4fb6
...
...
@@ -13,7 +13,7 @@ class Rails31Tests < Test::Unit::TestCase
def
expected
@expected
||=
{
:model
=>
0
,
:template
=>
1
5
,
:template
=>
1
6
,
:controller
=>
1
,
:warning
=>
48
}
end
...
...
@@ -604,4 +604,13 @@ class Rails31Tests < Test::Unit::TestCase
:confidence
=>
0
,
:file
=>
/Gemfile/
end
def
test_to_json_with_overwritten_config
assert_warning
:type
=>
:template
,
:warning_type
=>
"Cross Site Scripting"
,
:message
=>
/^Unescaped parameter value in JSON hash/
,
:confidence
=>
0
,
:line
=>
1
,
:file
=>
/json_test\.html\.erb/
end
end
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录