Skip to content

Instantly share code, notes, and snippets.

What would you like to do?
CVE-2013-0156 is a nasty vulnerability in many versions of Rails. This script checks all your Heroku apps for this vulnerability in one quick (slow) move. More info:!topic/rubyonrails-security/61bkgvnSGTQ/discussion
## The quick-and-nasty CVE-2013-0156 Heroku inspector!
## Originally brought to you by @elliottkember with changes by @markpundsack @ Heroku
## Download and run using:
## ruby heroku-CVE-2013-0156.rb
`heroku list`.split("\n").each do |app|
app = app.strip
# Some "heroku apps" lines have === formatting for grouping. They're not apps.
next if app[0..2] == "==="
# Some are appended by owner emails
app = app.split(" ")[0].to_s.strip
# Blank lines can be ommitted.
next if app == ""
rails_path = `heroku run bundle show rails --app #{app}`.split("\n")[-1]
rails_version_number = rails_path.split("rails-")[1]
rails_version_number = rails_version_number.strip unless rails_version_number.nil?
unless ["3.2.11", "3.1.10", "3.0.19", "2.3.15"].include?(rails_version_number) or rails_version_number.nil?
puts "Uh oh! #{app} has #{rails_version_number}."
puts "..."
Copy link

will commented Jan 9, 2013

I'd suggest using heroku run bundle show rails instead

Copy link

elliottkember commented Jan 9, 2013

Great idea, will - updated!

Copy link

markpundsack commented Jan 10, 2013

If you've got non-rails apps, you get a lot of false positives with this. How about checking for rails_version_number.nil? instead of ""?

Copy link

elliottkember commented Jan 11, 2013

Thanks Mark - much better idea. Updated with your changes!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment