Maxim Integrated's IoT development kit
Dependencies: MAX30101 MAX30003 MAX113XX_Pixi MAX30205 max32630fthr USBDevice
tools/Rats-2.4/rats-ruby.xml
- Committer:
- Mahir Ozturk
- Date:
- 2018-03-13
- Revision:
- 1:efe9cad8942f
File content as of revision 1:efe9cad8942f:
<!DOCTYPE RATS [
<!ENTITY rubysafelevel "Ruby safe level 2 disables this function as it could be potentially dangerous. Verify this function is being used in a safe manner.">
]>
<VulnDB lang="ruby">
<Vulnerability>
<Name>umask</Name>
<Info>
<Severity>Medium</Severity>
<Description>&rubysafelevel;</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>flock</Name>
<Info>
<Severity>Medium</Severity>
<Description>&rubysafelevel;</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>ioctl</Name>
<Info>
<Severity>Medium</Severity>
<Description>&rubysafelevel;</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>stat</Name>
<Info>
<Severity>Medium</Severity>
<Description>&rubysafelevel;</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>fork</Name>
<Info>
<Severity>Low</Severity>
<Description>&rubysafelevel;</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>syscall</Name>
<Info>
<Severity>High</Severity>
<Description>&rubysafelevel;</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>trap</Name>
<Info>
<Severity>Medium</Severity>
<Description>&rubysafelevel;</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>setpgid</Name>
<Info>
<Severity>Medium</Severity>
<Description>&rubysafelevel;</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>edgid</Name>
<Info>
<Severity>Medium</Severity>
<Description>&rubysafelevel;</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>setsid</Name>
<Info>
<Severity>Medium</Severity>
<Description>&rubysafelevel;</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>setpriority</Name>
<Info>
<Severity>Medium</Severity>
<Description>&rubysafelevel;</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>autoload</Name>
<Info>
<Severity>High</Severity>
<Description>&rubysafelevel;</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>chmod</Name>
<Info>
<Severity>Medium</Severity>
<Description>&rubysafelevel;</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>chown</Name>
<Info>
<Severity>Medium</Severity>
<Description>&rubysafelevel;</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>lstat</Name>
<Info>
<Severity>Medium</Severity>
<Description>&rubysafelevel;</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>truncate</Name>
<Info>
<Severity>Medium</Severity>
<Description>&rubysafelevel;</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>untaint</Name>
<Info>
<Severity>Medium</Severity>
<Description>Verify variable is properly validated from tainted input.</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>send_files</Name>
<Info>
<Severity>Medium</Severity>
<Description>Unchecked user input could allow director traversal attacks.</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>system</Name>
<Info>
<Severity>High</Severity>
<Description>Make sure user data is not pass to system.</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>exec</Name>
<Info>
<Severity>High</Severity>
<Description>Make sure user data is not passed to exec.</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>open</Name>
<Info>
<Severity>Medium</Severity>
<Description>This method allows I/O access outside of the application. All I/O should be validated.</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>params</Name>
<Info>
<Severity>Medium</Severity>
<Description>Use of params, verify all user values are checked before using. Never pass params directly to a new object i.e. Object.new(params[:user])</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>chmod_R</Name>
<Info>
<Severity>Medium</Severity>
<Description></Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>chown_R</Name>
<Info>
<Severity>Medium</Severity>
<Description></Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>ln_s</Name>
<Info>
<Severity>Medium</Severity>
<Description></Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>mkdir_p</Name>
<Info>
<Severity>Medium</Severity>
<Description></Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>mkpath</Name>
<Info>
<Severity>Medium</Severity>
<Description></Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>touch</Name>
<Info>
<Severity>Medium</Severity>
<Description></Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>popen</Name>
<Info>
<Severity>High</Severity>
<Description>Unchecked user input could all exectuion of system commands.</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>popen3</Name>
<Info>
<Severity>High</Severity>
<Description>Unchecked user input could all exectuion of system commands.</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>load</Name>
<Info>
<Severity>Low</Severity>
<Description>Unchecked user input could all loading of rouge scripts.</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>rand</Name>
<Info>
<Severity>Medium</Severity>
<Description>Make sure this function is not being used for any security related tasks.</Description>
</Info>
</Vulnerability>
<Vulnerability>
<Name>srand</Name>
<Info>
<Severity>Medium</Severity>
<Description>Make sure this function is not being used for any security related tasks.</Description>
</Info>
</Vulnerability>
<!--TOCTTOU Section -->
<Vulnerability>
<Name>exist?</Name>
<RaceCheck>1</RaceCheck>
</Vulnerability>
<Vulnerability>
<Name>exists?</Name>
<RaceCheck>1</RaceCheck>
</Vulnerability>
<Vulnerability>
<Name>rm_r</Name>
<RaceCheck>1</RaceCheck>
</Vulnerability>
<Vulnerability>
<Name>safe_unlink</Name>
<RaceCheck>1</RaceCheck>
</Vulnerability>
<Vulnerability>
<Name>rm_rf</Name>
<RaceCheck>1</RaceCheck>
</Vulnerability>
<Vulnerability>
<Name>rmtree</Name>
<RaceCheck>1</RaceCheck>
</Vulnerability>
<Vulnerability>
<Name>remove_entry_secure</Name>
<RaceCheck>1</RaceCheck>
</Vulnerability>
<Vulnerability>
<Name>zero?</Name>
<RaceCheck>1</RaceCheck>
</Vulnerability>
<Vulnerability>
<Name>identical?</Name>
<RaceCheck>1</RaceCheck>
</Vulnerability>
<Vulnerability>
<Name>executable?</Name>
<RaceCheck>1</RaceCheck>
</Vulnerability>
<Vulnerability>
<Name>directory?</Name>
<RaceCheck>1</RaceCheck>
</Vulnerability>
<Vulnerability>
<Name>file?</Name>
<RaceCheck>1</RaceCheck>
</Vulnerability>
<Vulnerability>
<Name>empty?</Name>
<RaceCheck>1</RaceCheck>
</Vulnerability>
</VulnDB>