lib/sobelow/vuln/plug_null.ex

defmodule Sobelow.Vuln.PlugNull do
  @moduledoc """
  # Plug Version Vulnerable to Null Byte Injection

  For more information visit:
  https://github.com/advisories/GHSA-2q6v-32mr-8p8x

  Null Byte Injection checks can be ignored with the following command:

      $ mix sobelow -i Vuln.PlugNull
  """
  alias Sobelow.Config
  alias Sobelow.Vuln

  @uid 26
  @finding_type "Vuln.PlugNull: Known Vulnerable Dependency - Update Plug"

  use Sobelow.Finding

  # we could _probably_ remove some of these versions since if Sobelow is running,
  # it means there is a minimum version of Elixir on the system which the lower
  # versions of Plug wouldn't support - will leave for now to reflect CVE
  @vuln_vsn ~w(1.3.1 1.3.0 1.2.2 1.2.1 1.2.0 1.1.6 1.1.5 1.1.4 1.1.3 1.1.2 1.1.1 1.1.0 1.0.3 1.0.2 1.0.1 1.0.0)

  def run(root) do
    plug_conf = root <> "/deps/plug/mix.exs"

    if File.exists?(plug_conf) do
      vsn = Config.get_version(plug_conf)

      if Enum.member?(@vuln_vsn, vsn) do
        Vuln.print_finding(
          plug_conf,
          vsn,
          "Plug",
          "Null Byte Injection in Plug.Static",
          "CVE-2017-1000052",
          "PlugNull"
        )
      end
    end
  end
end