Spectra Assure
Community
Docs
warningRisk: Vulnerabilities
Scanned: about 10 hours ago

activerecord

Object-relational mapper framework (part of Rails).
License: Permissive (MIT)
Published: 10 days ago



SAFE Assessment

Compliance

Licenses
No license compliance issues
Secrets
2 web service credentials found

Security

Vulnerabilities
1 medium severity vulnerabilities
Hardening
No application hardening issues

Threats

Tampering
No evidence of software tampering
Malware
No evidence of malware inclusion

Popularity

717.48M
Total Downloads
Contributor
Declared Dependencies
6.97k
Dependents

Top issues

Problem

Software composition analysis has identified a component with one or more known vulnerabilities. Based on the CVSS scoring, these vulnerabilities have been marked as medium severity.

Prevalence in RubyGems community

37 packages
found in
Top 100
241 packages
found in
Top 1k
3097 packages
found in
Top 10k
47522 packages
in community

Next steps

Perform impact analysis for the reported CVEs.
Update the component to the latest version.
If the update can't resolve the issue, create a plan to isolate or replace the affected component.

Problem

Various network communication protocols allow including plaintext authentication credentials. Information such as user names and passwords could be passed through a non-encrypted channel, and therefore intercepted by malicious actors. Credentials are considered secrets, and should be kept encrypted until they are used. This policy control matches the following URI pattern protocol://username:password@domain within any software package component.

Prevalence in RubyGems community

6 packages
found in
Top 100
16 packages
found in
Top 1k
69 packages
found in
Top 10k
401 packages
in community

Next steps

Review the reported matches. If the warning refers to a placeholder credential value, it can be safely ignored.

Problem

Uniform Resource Locators (URLs) are structured addresses that point to locations and assets on the internet. URLs allow software developers to build complex applications that exchange data with servers that can be hosted in multiple geographical regions. URLs can commonly be found embedded in documentation, configuration files, source code and compiled binaries. A port number is associated with a network address of a host, such as an IP address, and the type of network protocol used for communication. Within URLs, the ports are optional. Ports can be specified in a URL immediately following the domain name. Each network protocol, or schema, has a set of standard ports on which the service operates. This issue is raised when a mismatch between a network protocol and its expected port number is detected. While the presence of non-standard ports does not imply malicious intent, all of their uses in a software package should be documented and approved.

Prevalence in RubyGems community

27 packages
found in
Top 100
375 packages
found in
Top 1k
1571 packages
found in
Top 10k
15785 packages
in community

Next steps

Investigate reported detections.
If the software should not include these network references, investigate your build and release environment for software supply chain compromise.
You should delay the software release until the investigation is completed, or until the issue is risk accepted.
Consider changing the port to one that is standard for the networking protocol.

Problem

Private keys and certificates are considered sensitive information that should not be included in released software packages. However, developers frequently release sensitive information alongside their applications to facilitate automated software testing. Testing keys and certificates often proliferate through the software supply chain. When such information gets shared publicly, it is catalogued by file reputation databases. Any private key and certificate files seen by a file reputation database prior to configured time threshold can be automatically suppressed. Commonly shared sensitive information is not considered to be secret.

Prevalence in RubyGems community

16 packages
found in
Top 100
83 packages
found in
Top 1k
671 packages
found in
Top 10k
5227 packages
in community

Next steps

Review the commonly shared sensitive information for evidence of inadvertently exposed secrets.
If the keys were published unintentionally and the software has been made public, you should revoke the keys and file a security incident.

Top behaviors

Prevalence in RubyGems community

Behavior often found in this community (Common)
4 packages
found in
Top 100
10 packages
found in
Top 1k
49 packages
found in
Top 10k
419 packages
in community

Prevalence in RubyGems community

Behavior often found in this community (Common)
15 packages
found in
Top 100
98 packages
found in
Top 1k
644 packages
found in
Top 10k
5994 packages
in community

Prevalence in RubyGems community

Behavior often found in this community (Common)
15 packages
found in
Top 100
74 packages
found in
Top 1k
454 packages
found in
Top 10k
3816 packages
in community

Prevalence in RubyGems community

Behavior often found in this community (Common)
53 packages
found in
Top 100
247 packages
found in
Top 1k
2209 packages
found in
Top 10k
16324 packages
in community

Prevalence in RubyGems community

Behavior often found in this community (Common)
41 packages
found in
Top 100
130 packages
found in
Top 1k
833 packages
found in
Top 10k
8732 packages
in community

Top vulnerabilities

Vulnerability Exploitation Lifecycle
(1 Active Vulnerabilities)
1 (0 Fixable)
CVE-2016-0753m
None
None
None
Exploits Unknown
Exploits Exist
Exploited by Malware
Patching Mandated