example.sarif.json (original) (raw)

{

"version": "2.1.0",

"$schema": "https://raw.githubusercontent.com/oasis-tcs/sarif-spec/master/Schemata/sarif-schema-2.1.0.json",

"runs": [

{

"tool": {

"driver": {

"name": "Brakeman",

"informationUri": "https://brakemanscanner.org",

"semanticVersion": "4.10.0",

"rules": [

{

"id": "BRAKE0102",

"name": "ContentTag/Cross-Site Scripting",

"fullDescription": {

"text": "Checks for XSS in calls to content_tag."

},

"helpUri": "https://groups.google.com/d/msg/ruby-security-ann/8B2iV2tPRSE/JkjCJkSoCgAJ",

"help": {

"text": "More info: https://groups.google.com/d/msg/ruby-security-ann/8B2iV2tPRSE/JkjCJkSoCgAJ.",

"markdown": "[More info](https://groups.google.com/d/msg/ruby-security-ann/8B2iV2tPRSE/JkjCJkSoCgAJ)."

},

"properties": {

"tags": [

"ContentTag"

]

}

},

{

"id": "BRAKE0116",

"name": "CSRFTokenForgeryCVE/Cross-Site Request Forgery",

"fullDescription": {

"text": "Checks for versions with CSRF token forgery vulnerability (CVE-2020-8166)."

},

"helpUri": "https://groups.google.com/g/rubyonrails-security/c/NOjKiGeXUgw",

"help": {

"text": "More info: https://groups.google.com/g/rubyonrails-security/c/NOjKiGeXUgw.",

"markdown": "[More info](https://groups.google.com/g/rubyonrails-security/c/NOjKiGeXUgw)."

},

"properties": {

"tags": [

"CSRFTokenForgeryCVE"

]

}

},

{

"id": "BRAKE0077",

"name": "DefaultRoutes/Remote Code Execution",

"fullDescription": {

"text": "Checks for default routes."

},

"helpUri": "http://matasano.com/research/AnatomyOfRailsVuln-CVE-2014-0130.pdf",

"help": {

"text": "More info: http://matasano.com/research/AnatomyOfRailsVuln-CVE-2014-0130.pdf.",

"markdown": "[More info](http://matasano.com/research/AnatomyOfRailsVuln-CVE-2014-0130.pdf)."

},

"properties": {

"tags": [

"DefaultRoutes"

]

}

},

{

"id": "BRAKE0014",

"name": "Execute/Command Injection",

"fullDescription": {

"text": "Finds instances of possible command injection."

},

"helpUri": "https://brakemanscanner.org/docs/warning\_types/command\_injection/",

"help": {

"text": "More info: https://brakemanscanner.org/docs/warning\_types/command\_injection/.",

"markdown": "[More info](https://brakemanscanner.org/docs/warning\_types/command\_injection/)."

},

"properties": {

"tags": [

"Execute"

]

}

},

{

"id": "BRAKE0063",

"name": "I18nXSS/Cross-Site Scripting",

"fullDescription": {

"text": "Checks for i18n XSS (CVE-2013-4491)."

},

"helpUri": "https://groups.google.com/d/msg/ruby-security-ann/pLrh6DUw998/bLFEyIO4k\_EJ",

"help": {

"text": "More info: https://groups.google.com/d/msg/ruby-security-ann/pLrh6DUw998/bLFEyIO4k\_EJ.",

"markdown": "[More info](https://groups.google.com/d/msg/ruby-security-ann/pLrh6DUw998/bLFEyIO4k\_EJ)."

},

"properties": {

"tags": [

"I18nXSS"

]

}

},

{

"id": "BRAKE0049",

"name": "JSONParsing/Remote Code Execution",

"fullDescription": {

"text": "Checks for JSON parsing vulnerabilities CVE-2013-0333 and CVE-2013-0269."

},

"helpUri": "https://groups.google.com/d/topic/rubyonrails-security/4\_YvCpLzL58/discussion",

"help": {

"text": "More info: https://groups.google.com/d/topic/rubyonrails-security/4\_YvCpLzL58/discussion.",

"markdown": "[More info](https://groups.google.com/d/topic/rubyonrails-security/4\_YvCpLzL58/discussion)."

},

"properties": {

"tags": [

"JSONParsing"

]

}

},

{

"id": "BRAKE0094",

"name": "MimeTypeDoS/Denial of Service",

"fullDescription": {

"text": "Checks for mime type denial of service (CVE-2016-0751)."

},

"helpUri": "https://groups.google.com/d/msg/rubyonrails-security/9oLY\_FCzvoc/w9oI9XxbFQAJ",

"help": {

"text": "More info: https://groups.google.com/d/msg/rubyonrails-security/9oLY\_FCzvoc/w9oI9XxbFQAJ.",

"markdown": "[More info](https://groups.google.com/d/msg/rubyonrails-security/9oLY\_FCzvoc/w9oI9XxbFQAJ)."

},

"properties": {

"tags": [

"MimeTypeDoS"

]

}

},

{

"id": "BRAKE0073",

"name": "NumberToCurrency/Cross-Site Scripting",

"fullDescription": {

"text": "Checks for number helpers XSS vulnerabilities in certain versions."

},

"helpUri": "https://groups.google.com/d/msg/ruby-security-ann/9WiRn2nhfq0/2K2KRB4LwCMJ",

"help": {

"text": "More info: https://groups.google.com/d/msg/ruby-security-ann/9WiRn2nhfq0/2K2KRB4LwCMJ.",

"markdown": "[More info](https://groups.google.com/d/msg/ruby-security-ann/9WiRn2nhfq0/2K2KRB4LwCMJ)."

},

"properties": {

"tags": [

"NumberToCurrency"

]

}

},

{

"id": "BRAKE0018",

"name": "Redirect/Redirect",

"fullDescription": {

"text": "Looks for calls to redirect_to with user input as arguments."

},

"helpUri": "https://brakemanscanner.org/docs/warning\_types/redirect/",

"help": {

"text": "More info: https://brakemanscanner.org/docs/warning\_types/redirect/.",

"markdown": "[More info](https://brakemanscanner.org/docs/warning\_types/redirect/)."

},

"properties": {

"tags": [

"Redirect"

]

}

},

{

"id": "BRAKE0075",

"name": "RenderDoS/Denial of Service",

"fullDescription": {

"text": "Warn about denial of service with render :text (CVE-2014-0082)."

},

"helpUri": "https://groups.google.com/d/msg/rubyonrails-security/LMxO\_3\_eCuc/ozGBEhKaJbIJ",

"help": {

"text": "More info: https://groups.google.com/d/msg/rubyonrails-security/LMxO\_3\_eCuc/ozGBEhKaJbIJ.",

"markdown": "[More info](https://groups.google.com/d/msg/rubyonrails-security/LMxO\_3\_eCuc/ozGBEhKaJbIJ)."

},

"properties": {

"tags": [

"RenderDoS"

]

}

},

{

"id": "BRAKE0108",

"name": "SprocketsPathTraversal/Path Traversal",

"fullDescription": {

"text": "Checks for CVE-2018-3760."

},

"helpUri": "https://groups.google.com/d/msg/rubyonrails-security/ft\_J--l55fM/7roDfQ50BwAJ",

"help": {

"text": "More info: https://groups.google.com/d/msg/rubyonrails-security/ft\_J--l55fM/7roDfQ50BwAJ.",

"markdown": "[More info](https://groups.google.com/d/msg/rubyonrails-security/ft\_J--l55fM/7roDfQ50BwAJ)."

},

"properties": {

"tags": [

"SprocketsPathTraversal"

]

}

},

{

"id": "BRAKE0046",

"name": "SQLCVEs/SQL Injection",

"fullDescription": {

"text": "Checks for several SQL CVEs."

},

"helpUri": "https://groups.google.com/d/topic/rubyonrails-security/DCNTNp\_qjFM/discussion",

"help": {

"text": "More info: https://groups.google.com/d/topic/rubyonrails-security/DCNTNp\_qjFM/discussion.",

"markdown": "[More info](https://groups.google.com/d/topic/rubyonrails-security/DCNTNp\_qjFM/discussion)."

},

"properties": {

"tags": [

"SQLCVEs"

]

}

},

{

"id": "BRAKE0047",

"name": "SQLCVEs/SQL Injection",

"fullDescription": {

"text": "Checks for several SQL CVEs."

},

"helpUri": "https://groups.google.com/d/topic/rubyonrails-security/c7jT-EeN9eI/discussion",

"help": {

"text": "More info: https://groups.google.com/d/topic/rubyonrails-security/c7jT-EeN9eI/discussion.",

"markdown": "[More info](https://groups.google.com/d/topic/rubyonrails-security/c7jT-EeN9eI/discussion)."

},

"properties": {

"tags": [

"SQLCVEs"

]

}

},

{

"id": "BRAKE0069",

"name": "SQLCVEs/SQL Injection",

"fullDescription": {

"text": "Checks for several SQL CVEs."

},

"helpUri": "https://groups.google.com/d/msg/ruby-security-ann/niK4drpSHT4/g8JW8ZsayRkJ",

"help": {

"text": "More info: https://groups.google.com/d/msg/ruby-security-ann/niK4drpSHT4/g8JW8ZsayRkJ.",

"markdown": "[More info](https://groups.google.com/d/msg/ruby-security-ann/niK4drpSHT4/g8JW8ZsayRkJ)."

},

"properties": {

"tags": [

"SQLCVEs"

]

}

},

{

"id": "BRAKE0055",

"name": "SymbolDoSCVE/Denial of Service",

"fullDescription": {

"text": "Checks for versions with ActiveRecord symbol denial of service vulnerability."

},

"helpUri": "https://groups.google.com/d/msg/rubyonrails-security/jgJ4cjjS8FE/BGbHRxnDRTIJ",

"help": {

"text": "More info: https://groups.google.com/d/msg/rubyonrails-security/jgJ4cjjS8FE/BGbHRxnDRTIJ.",

"markdown": "[More info](https://groups.google.com/d/msg/rubyonrails-security/jgJ4cjjS8FE/BGbHRxnDRTIJ)."

},

"properties": {

"tags": [

"SymbolDoSCVE"

]

}

},

{

"id": "BRAKE0088",

"name": "XMLDoS/Denial of Service",

"fullDescription": {

"text": "Checks for XML denial of service (CVE-2015-3227)."

},

"helpUri": "https://groups.google.com/d/msg/rubyonrails-security/bahr2JLnxvk/x4EocXnHPp8J",

"help": {

"text": "More info: https://groups.google.com/d/msg/rubyonrails-security/bahr2JLnxvk/x4EocXnHPp8J.",

"markdown": "[More info](https://groups.google.com/d/msg/rubyonrails-security/bahr2JLnxvk/x4EocXnHPp8J)."

},

"properties": {

"tags": [

"XMLDoS"

]

}

},

{

"id": "BRAKE0048",

"name": "YAMLParsing/Remote Code Execution",

"fullDescription": {

"text": "Checks for YAML parsing vulnerabilities (CVE-2013-0156)."

},

"helpUri": "https://groups.google.com/d/topic/rubyonrails-security/61bkgvnSGTQ/discussion",

"help": {

"text": "More info: https://groups.google.com/d/topic/rubyonrails-security/61bkgvnSGTQ/discussion.",

"markdown": "[More info](https://groups.google.com/d/topic/rubyonrails-security/61bkgvnSGTQ/discussion)."

},

"properties": {

"tags": [

"YAMLParsing"

]

}

},

{

"id": "BRAKE0002",

"name": "CrossSiteScripting/Cross-Site Scripting",

"fullDescription": {

"text": "Checks for unescaped output in views."

},

"helpUri": "https://brakemanscanner.org/docs/warning\_types/cross\_site\_scripting",

"help": {

"text": "More info: https://brakemanscanner.org/docs/warning\_types/cross\_site\_scripting.",

"markdown": "[More info](https://brakemanscanner.org/docs/warning\_types/cross\_site\_scripting)."

},

"properties": {

"tags": [

"CrossSiteScripting"

]

}

},

{

"id": "BRAKE0056",

"name": "SanitizeMethods/Cross-Site Scripting",

"fullDescription": {

"text": "Checks for versions with vulnerable sanitize and sanitize_css."

},

"helpUri": "https://groups.google.com/d/msg/rubyonrails-security/4\_QHo4BqnN8/\_RrdfKk12I4J",

"help": {

"text": "More info: https://groups.google.com/d/msg/rubyonrails-security/4\_QHo4BqnN8/\_RrdfKk12I4J.",

"markdown": "[More info](https://groups.google.com/d/msg/rubyonrails-security/4\_QHo4BqnN8/\_RrdfKk12I4J)."

},

"properties": {

"tags": [

"SanitizeMethods"

]

}

},

{

"id": "BRAKE0012",

"name": "DefaultRoutes/Default Routes",

"fullDescription": {

"text": "Checks for default routes."

},

"helpUri": "https://brakemanscanner.org/docs/warning\_types/default\_routes/",

"help": {

"text": "More info: https://brakemanscanner.org/docs/warning\_types/default\_routes/.",

"markdown": "[More info](https://brakemanscanner.org/docs/warning\_types/default\_routes/)."

},

"properties": {

"tags": [

"DefaultRoutes"

]

}

},

{

"id": "BRAKE0060",

"name": "ModelAttrAccessible/Mass Assignment",

"fullDescription": {

"text": "Reports models which have dangerous attributes defined via attr_accessible."

},

"helpUri": "https://brakemanscanner.org/docs/warning\_types/mass\_assignment/",

"help": {

"text": "More info: https://brakemanscanner.org/docs/warning\_types/mass\_assignment/.",

"markdown": "[More info](https://brakemanscanner.org/docs/warning\_types/mass\_assignment/)."

},

"properties": {

"tags": [

"ModelAttrAccessible"

]

}

}

]

}

},

"results": [

{

"ruleId": "BRAKE0102",

"ruleIndex": 0,

"level": "warning",

"message": {

"text": "Rails 3.2.9.rc2 `content_tag` does not escape double quotes in attribute values (CVE-2016-6316). Upgrade to Rails 3.2.22.4."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "Gemfile.lock",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 64

}

}

}

]

},

{

"ruleId": "BRAKE0116",

"ruleIndex": 1,

"level": "warning",

"message": {

"text": "Rails 3.2.9.rc2 has a vulnerability that may allow CSRF token forgery. Upgrade to Rails 5.2.4.3 or patch."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "Gemfile.lock",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 64

}

}

}

]

},

{

"ruleId": "BRAKE0077",

"ruleIndex": 2,

"level": "error",

"message": {

"text": "Rails 3.2.9.rc2 with globbing routes is vulnerable to directory traversal and remote code execution. Patch or upgrade to Rails 3.2.18."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "config/routes.rb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 1

}

}

}

]

},

{

"ruleId": "BRAKE0014",

"ruleIndex": 3,

"level": "error",

"message": {

"text": "Possible command injection."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "app/controllers/exec_controller.rb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 5

}

}

}

]

},

{

"ruleId": "BRAKE0014",

"ruleIndex": 3,

"level": "error",

"message": {

"text": "Possible command injection."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "app/controllers/exec_controller/command_dependency.rb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 3

}

}

}

]

},

{

"ruleId": "BRAKE0014",

"ruleIndex": 3,

"level": "error",

"message": {

"text": "Possible command injection."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "app/models/multi_model.rb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 5

}

}

}

]

},

{

"ruleId": "BRAKE0014",

"ruleIndex": 3,

"level": "error",

"message": {

"text": "Possible command injection."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "app/models/multi_model.rb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 13

}

}

}

]

},

{

"ruleId": "BRAKE0014",

"ruleIndex": 3,

"level": "error",

"message": {

"text": "Possible command injection."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "app/models/user/command_dependency.rb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 3

}

}

}

]

},

{

"ruleId": "BRAKE0063",

"ruleIndex": 4,

"level": "warning",

"message": {

"text": "Rails 3.2.9.rc2 has an XSS vulnerability in i18n 0.6.1 (CVE-2013-4491). Upgrade to Rails 4.0.2 or i18n 0.6.6."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "Gemfile.lock",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 44

}

}

}

]

},

{

"ruleId": "BRAKE0049",

"ruleIndex": 5,

"level": "error",

"message": {

"text": "json gem 1.7.5 has a remote code execution vulnerability. Upgrade to json gem 1.7.7."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "Gemfile.lock",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 49

}

}

}

]

},

{

"ruleId": "BRAKE0094",

"ruleIndex": 6,

"level": "warning",

"message": {

"text": "Rails 3.2.9.rc2 is vulnerable to denial of service via mime type caching (CVE-2016-0751). Upgrade to Rails 3.2.22.1."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "Gemfile.lock",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 64

}

}

}

]

},

{

"ruleId": "BRAKE0073",

"ruleIndex": 7,

"level": "warning",

"message": {

"text": "Rails 3.2.9.rc2 has a vulnerability in number helpers (CVE-2014-0081). Upgrade to Rails 3.2.17."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "Gemfile.lock",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 64

}

}

}

]

},

{

"ruleId": "BRAKE0018",

"ruleIndex": 8,

"level": "error",

"message": {

"text": "Possible unprotected redirect."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "app/controllers/removal_controller.rb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 14

}

}

}

]

},

{

"ruleId": "BRAKE0075",

"ruleIndex": 9,

"level": "error",

"message": {

"text": "Rails 3.2.9.rc2 has a denial of service vulnerability (CVE-2014-0082). Upgrade to Rails 3.2.17."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "Gemfile.lock",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 64

}

}

}

]

},

{

"ruleId": "BRAKE0108",

"ruleIndex": 10,

"level": "note",

"message": {

"text": "sprockets 2.1.3 has a path traversal vulnerability (CVE-2018-3760). Upgrade to sprockets 2.12.5 or newer."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "Gemfile.lock",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 87

}

}

}

]

},

{

"ruleId": "BRAKE0046",

"ruleIndex": 11,

"level": "error",

"message": {

"text": "Rails 3.2.9.rc2 contains a SQL injection vulnerability (CVE-2012-5664). Upgrade to Rails 3.2.18."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "Gemfile.lock",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 64

}

}

}

]

},

{

"ruleId": "BRAKE0047",

"ruleIndex": 12,

"level": "error",

"message": {

"text": "Rails 3.2.9.rc2 contains a SQL injection vulnerability (CVE-2013-0155). Upgrade to Rails 3.2.11."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "Gemfile.lock",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 64

}

}

}

]

},

{

"ruleId": "BRAKE0069",

"ruleIndex": 13,

"level": "error",

"message": {

"text": "Rails 3.2.9.rc2 contains a SQL injection vulnerability (CVE-2013-6417). Upgrade to Rails 3.2.16."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "Gemfile.lock",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 64

}

}

}

]

},

{

"ruleId": "BRAKE0055",

"ruleIndex": 14,

"level": "warning",

"message": {

"text": "Rails 3.2.9.rc2 has a denial of service vulnerability in ActiveRecord. Upgrade to Rails 3.2.13 or patch."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "Gemfile.lock",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 64

}

}

}

]

},

{

"ruleId": "BRAKE0088",

"ruleIndex": 15,

"level": "warning",

"message": {

"text": "Rails 3.2.9.rc2 is vulnerable to denial of service via XML parsing (CVE-2015-3227). Upgrade to Rails 3.2.22."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "Gemfile.lock",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 64

}

}

}

]

},

{

"ruleId": "BRAKE0048",

"ruleIndex": 16,

"level": "error",

"message": {

"text": "Rails 3.2.9.rc2 has a remote code execution vulnerability. Upgrade to Rails 3.2.11 or disable XML parsing."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "Gemfile.lock",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 64

}

}

}

]

},

{

"ruleId": "BRAKE0002",

"ruleIndex": 17,

"level": "error",

"message": {

"text": "Unescaped model attribute."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "app/views/removal/_partial.html.erb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 1

}

}

}

]

},

{

"ruleId": "BRAKE0002",

"ruleIndex": 17,

"level": "error",

"message": {

"text": "Unescaped parameter value."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "app/views/removal/controller_removed.html.erb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 1

}

}

}

]

},

{

"ruleId": "BRAKE0002",

"ruleIndex": 17,

"level": "error",

"message": {

"text": "Unescaped parameter value."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "app/views/removal/implicit_render.html.erb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 2

}

}

}

]

},

{

"ruleId": "BRAKE0002",

"ruleIndex": 17,

"level": "error",

"message": {

"text": "Unescaped model attribute."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "app/views/users/_form.html.erb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 1

}

}

}

]

},

{

"ruleId": "BRAKE0002",

"ruleIndex": 17,

"level": "error",

"message": {

"text": "Unescaped parameter value."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "app/views/users/_slimmer.html.slim",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 6

}

}

}

]

},

{

"ruleId": "BRAKE0002",

"ruleIndex": 17,

"level": "error",

"message": {

"text": "Unescaped model attribute."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "app/views/users/_slimmer.html.slim",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 8

}

}

}

]

},

{

"ruleId": "BRAKE0002",

"ruleIndex": 17,

"level": "error",

"message": {

"text": "Unescaped model attribute."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "app/views/users/mixed_in.html.erb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 1

}

}

}

]

},

{

"ruleId": "BRAKE0002",

"ruleIndex": 17,

"level": "error",

"message": {

"text": "Unescaped parameter value."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "app/views/users/show.html.erb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 15

}

}

}

]

},

{

"ruleId": "BRAKE0002",

"ruleIndex": 17,

"level": "error",

"message": {

"text": "Unescaped parameter value."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "app/views/users/slimming.html.slim",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 3

}

}

}

]

},

{

"ruleId": "BRAKE0002",

"ruleIndex": 17,

"level": "error",

"message": {

"text": "Unescaped model attribute."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "app/views/users/slimming.html.slim",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 4

}

}

}

]

},

{

"ruleId": "BRAKE0056",

"ruleIndex": 18,

"level": "error",

"message": {

"text": "Rails 3.2.9.rc2 has a vulnerability in `sanitize_css`. Upgrade to Rails 3.2.13 or patch."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "app/views/users/sanitized.html.erb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 2

}

}

}

]

},

{

"ruleId": "BRAKE0012",

"ruleIndex": 19,

"level": "warning",

"message": {

"text": "Any public method in `GlobGetController` can be used as an action for `get` requests."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "config/routes.rb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 1

}

}

}

]

},

{

"ruleId": "BRAKE0012",

"ruleIndex": 19,

"level": "warning",

"message": {

"text": "Any public method in `GlobPostController` can be used as an action for `post` requests."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "config/routes.rb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 1

}

}

}

]

},

{

"ruleId": "BRAKE0012",

"ruleIndex": 19,

"level": "warning",

"message": {

"text": "Any public method in `GlobPutController` can be used as an action for `put` requests."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "config/routes.rb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 1

}

}

}

]

},

{

"ruleId": "BRAKE0012",

"ruleIndex": 19,

"level": "warning",

"message": {

"text": "Any public method in `GlobMatchController` can be used as an action for `matched` requests."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "config/routes.rb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 1

}

}

}

]

},

{

"ruleId": "BRAKE0012",

"ruleIndex": 19,

"level": "warning",

"message": {

"text": "Any public method in `FooGetController` can be used as an action for `get` requests."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "config/routes.rb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 1

}

}

}

]

},

{

"ruleId": "BRAKE0012",

"ruleIndex": 19,

"level": "warning",

"message": {

"text": "Any public method in `FooPostController` can be used as an action for `post` requests."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "config/routes.rb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 1

}

}

}

]

},

{

"ruleId": "BRAKE0012",

"ruleIndex": 19,

"level": "warning",

"message": {

"text": "Any public method in `FooPutController` can be used as an action for `put` requests."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "config/routes.rb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 1

}

}

}

]

},

{

"ruleId": "BRAKE0012",

"ruleIndex": 19,

"level": "warning",

"message": {

"text": "Any public method in `BarMatchController` can be used as an action for `matched` requests."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "config/routes.rb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 1

}

}

}

]

},

{

"ruleId": "BRAKE0060",

"ruleIndex": 20,

"level": "note",

"message": {

"text": "Potentially dangerous attribute available for mass assignment."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "app/models/account.rb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 1

}

}

}

]

},

{

"ruleId": "BRAKE0060",

"ruleIndex": 20,

"level": "warning",

"message": {

"text": "Potentially dangerous attribute available for mass assignment."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "app/models/account.rb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 1

}

}

}

]

},

{

"ruleId": "BRAKE0060",

"ruleIndex": 20,

"level": "error",

"message": {

"text": "Potentially dangerous attribute available for mass assignment."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "app/models/user.rb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 1

}

}

}

]

},

{

"ruleId": "BRAKE0060",

"ruleIndex": 20,

"level": "error",

"message": {

"text": "Potentially dangerous attribute available for mass assignment."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "app/models/user.rb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 1

}

}

}

]

},

{

"ruleId": "BRAKE0060",

"ruleIndex": 20,

"level": "note",

"message": {

"text": "Potentially dangerous attribute available for mass assignment."

},

"locations": [

{

"physicalLocation": {

"artifactLocation": {

"uri": "app/models/user.rb",

"uriBaseId": "%SRCROOT%"

},

"region": {

"startLine": 1

}

}

}

]

}

]

}

]

}