Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add advisories from SRC:CLR #238

Open
reedloden opened this issue Jan 26, 2016 · 13 comments
Open

Add advisories from SRC:CLR #238

reedloden opened this issue Jan 26, 2016 · 13 comments
Labels

Comments

@VanessaHenderson
Copy link
Contributor

@VanessaHenderson
Copy link
Contributor

@reedloden
Copy link
Member Author

@skorth
Copy link
Contributor

skorth commented Apr 4, 2016

@reedloden regarding spina ruby gem #250

@jasnow
Copy link
Contributor

jasnow commented Mar 12, 2023

Not sure https://srcclr.com is an active web site.

@VanessaHenderson
Copy link
Contributor

You are correct, SourceClear was purchased by Veracode. The easiest way to find the links now would be to search the s-* number at https://sca.analysiscenter.veracode.com/vulnerability-database
A lot of them will be privated unless you have a Veraode SCA account, otherwise it is just basic information available.

IE; Activeadmin that @reedloden posted is here: https://sca.analysiscenter.veracode.com/vulnerability-database/security/cross-site-scripting-xss-through-modal-dialog/ruby/sid-2276/summary

@jasnow
Copy link
Contributor

jasnow commented Mar 12, 2023

@VanessaHenderson - Thanks for the education.

@jasnow
Copy link
Contributor

jasnow commented Jun 3, 2023

h#query=type:vulnerability%20puppet

Need a list of specific "puppet" URLs.

@jasnow
Copy link
Contributor

jasnow commented Jun 4, 2023

admin-upmin, upmin and shoppe -- https://srcclr.com/security/cross-site-request-forgery-csrf-due-to/ruby/s-2266 devise_invitable -- https://srcclr.com/security/cross-site-request-forgery-csrf/ruby/s-2272

It appears that "s-2272" for devise_invitable may have be withdrawn if this is the same advisory: GHSA-wj5j-xpcj-45gc

@VanessaHenderson
Copy link
Contributor

It looks like SourceClear itself hasn't withdrawn the item, I wonder why GitHub withdrew it...

@jasnow
Copy link
Contributor

jasnow commented Jun 5, 2023

It looks like SourceClear itself hasn't withdrawn the item, I wonder why GitHub withdrew it...

Looks like all of the non-PR #616 advisories, including s-2272, appears to need a CVE/GHSA/etc ID before it is added to ruby-advisory-db repo so time will tell.

@VanessaHenderson
Copy link
Contributor

Ah yeah that'd probably do it. SourceClear/Veracode adds vulnerabilities that aren't necessarily assigned CVEs, basing on code fixes etc instead of solely CVE

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

5 participants