Brakeman Report

Application Path Rails Version Brakeman Version Report Time Checks Performed
/home/mike/github/arvados/apps/workbench 4.1.9 3.0.2 2015-03-13 06:51:02 +0100

13.342875966 seconds
BasicAuth, ContentTag, CreateWith, CrossSiteScripting, DefaultRoutes, Deserialize, DetailedExceptions, DigestDoS, EscapeFunction, Evaluation, Execute, FileAccess, FileDisclosure, FilterSkipping, ForgerySetting, HeaderDoS, I18nXSS, JRubyXML, JSONParsing, LinkTo, LinkToHref, MailTo, MassAssignment, ModelAttrAccessible, ModelAttributes, ModelSerialize, NestedAttributes, NumberToCurrency, QuoteTableName, Redirect, RegexDoS, Render, RenderDoS, RenderInline, ResponseSplitting, SQL, SQLCVEs, SSLVerify, SafeBufferManipulation, SanitizeMethods, SelectTag, SelectVulnerability, Send, SendFile, SessionSettings, SimpleFormat, SingleQuotes, SkipBeforeFilter, StripTags, SymbolDoSCVE, TranslateBug, UnsafeReflection, ValidationRegex, WithoutProtection, YAMLParsing

Summary

Scanned/Reported Total
Controllers 26
Models 23
Templates 157
Errors 0
Security Warnings 11 (9)
Ignored Warnings 0

Warning Type Total
Command Injection 1
Cross Site Scripting 6
Redirect 2
SQL Injection 1
SSL Verification Bypass 1

Security Warnings

Confidence Class Method Warning Type Message
High JobsController cancel Redirect
Possible unprotected redirect near line 54: redirect_to(params[:return_to])
High CollectionsController index SQL Injection
Possible SQL injection near line 60: Collection.select(Collection.columns.map(&:name))
High ArvadosApiClient api SSL Verification Bypass
SSL certificate verification was bypassed near line 89: HTTPClient.new.ssl_config.verify_mode = OpenS...
Medium FileStreamer each Command Injection
Possible command injection near line 333: IO.popen([Hash[ENV].dup, "arv-get", "#{@opts[:uuid]}/#{@opt...
Weak ActionsController show Redirect
Possible unprotected redirect near line 23: redirect_to(model_class.andand.find(params[:uuid]))

View Warnings

Confidence Template Warning Type Message
High application/_choose (ApplicationController#choose) Cross Site Scripting
Unescaped parameter value near line 26: params[:action_data]
High collections/_choose Cross Site Scripting
Unescaped parameter value near line 26: params[:action_data]
High pipeline_templates/_choose Cross Site Scripting
Unescaped parameter value near line 26: params[:action_data]
High projects/_choose Cross Site Scripting
Unescaped parameter value near line 26: params[:action_data]
High users/inactive (UsersController#inactive) Cross Site Scripting
Unsafe parameter value in link_to href near line 21: link_to("Retry", (params[:return_to] or "/"), :c...
High users/profile (UsersController#profile) Cross Site Scripting
Unsafe parameter value in link_to href near line 19: link_to("Back to work!", (params[:offer_return_t...