Ignore brakeman false positive warning (#16213)
This commit is contained in:
		
							parent
							
								
									be6f4e013a
								
							
						
					
					
						commit
						7032d4f582
					
				| @ -7,7 +7,7 @@ | ||||
|       "check_name": "SQL", | ||||
|       "message": "Possible SQL injection", | ||||
|       "file": "app/models/report.rb", | ||||
|       "line": 112, | ||||
|       "line": 113, | ||||
|       "link": "https://brakemanscanner.org/docs/warning_types/sql_injection/", | ||||
|       "code": "Admin::ActionLog.from(\"(#{[Admin::ActionLog.where(:target_type => \"Report\", :target_id => id, :created_at => ((created_at..updated_at))).unscope(:order), Admin::ActionLog.where(:target_type => \"Account\", :target_id => target_account_id, :created_at => ((created_at..updated_at))).unscope(:order), Admin::ActionLog.where(:target_type => \"Status\", :target_id => status_ids, :created_at => ((created_at..updated_at))).unscope(:order)].map do\n \"(#{query.to_sql})\"\n end.join(\" UNION ALL \")}) AS admin_action_logs\")", | ||||
|       "render_path": null, | ||||
| @ -67,7 +67,7 @@ | ||||
|       "check_name": "SQL", | ||||
|       "message": "Possible SQL injection", | ||||
|       "file": "app/models/account.rb", | ||||
|       "line": 491, | ||||
|       "line": 479, | ||||
|       "link": "https://brakemanscanner.org/docs/warning_types/sql_injection/", | ||||
|       "code": "find_by_sql([\"          WITH first_degree AS (\\n            SELECT target_account_id\\n            FROM follows\\n            WHERE account_id = ?\\n            UNION ALL\\n            SELECT ?\\n          )\\n          SELECT\\n            accounts.*,\\n            (count(f.id) + 1) * ts_rank_cd(#{textsearch}, #{query}, 32) AS rank\\n          FROM accounts\\n          LEFT OUTER JOIN follows AS f ON (accounts.id = f.account_id AND f.target_account_id = ?)\\n          WHERE accounts.id IN (SELECT * FROM first_degree)\\n            AND #{query} @@ #{textsearch}\\n            AND accounts.suspended_at IS NULL\\n            AND accounts.moved_to_account_id IS NULL\\n          GROUP BY accounts.id\\n          ORDER BY rank DESC\\n          LIMIT ? OFFSET ?\\n\".squish, account.id, account.id, account.id, limit, offset])", | ||||
|       "render_path": null, | ||||
| @ -120,6 +120,26 @@ | ||||
|       "confidence": "High", | ||||
|       "note": "" | ||||
|     }, | ||||
|     { | ||||
|       "warning_type": "Mass Assignment", | ||||
|       "warning_code": 105, | ||||
|       "fingerprint": "874be88fedf4c680926845e9a588d3197765a6ccbfdd76466b44cc00151c612e", | ||||
|       "check_name": "PermitAttributes", | ||||
|       "message": "Potentially dangerous key allowed for mass assignment", | ||||
|       "file": "app/controllers/api/v1/admin/reports_controller.rb", | ||||
|       "line": 78, | ||||
|       "link": "https://brakemanscanner.org/docs/warning_types/mass_assignment/", | ||||
|       "code": "params.permit(:resolved, :account_id, :target_account_id)", | ||||
|       "render_path": null, | ||||
|       "location": { | ||||
|         "type": "method", | ||||
|         "class": "Api::V1::Admin::ReportsController", | ||||
|         "method": "filter_params" | ||||
|       }, | ||||
|       "user_input": ":account_id", | ||||
|       "confidence": "High", | ||||
|       "note": "" | ||||
|     }, | ||||
|     { | ||||
|       "warning_type": "SQL Injection", | ||||
|       "warning_code": 0, | ||||
| @ -127,7 +147,7 @@ | ||||
|       "check_name": "SQL", | ||||
|       "message": "Possible SQL injection", | ||||
|       "file": "app/models/account.rb", | ||||
|       "line": 460, | ||||
|       "line": 448, | ||||
|       "link": "https://brakemanscanner.org/docs/warning_types/sql_injection/", | ||||
|       "code": "find_by_sql([\"        SELECT\\n          accounts.*,\\n          ts_rank_cd(#{textsearch}, #{query}, 32) AS rank\\n        FROM accounts\\n        WHERE #{query} @@ #{textsearch}\\n          AND accounts.suspended_at IS NULL\\n          AND accounts.moved_to_account_id IS NULL\\n        ORDER BY rank DESC\\n        LIMIT ? OFFSET ?\\n\".squish, limit, offset])", | ||||
|       "render_path": null, | ||||
| @ -207,7 +227,7 @@ | ||||
|       "check_name": "SQL", | ||||
|       "message": "Possible SQL injection", | ||||
|       "file": "app/models/account.rb", | ||||
|       "line": 507, | ||||
|       "line": 495, | ||||
|       "link": "https://brakemanscanner.org/docs/warning_types/sql_injection/", | ||||
|       "code": "find_by_sql([\"          SELECT\\n            accounts.*,\\n            (count(f.id) + 1) * ts_rank_cd(#{textsearch}, #{query}, 32) AS rank\\n          FROM accounts\\n          LEFT OUTER JOIN follows AS f ON (accounts.id = f.account_id AND f.target_account_id = ?) OR (accounts.id = f.target_account_id AND f.account_id = ?)\\n          WHERE #{query} @@ #{textsearch}\\n            AND accounts.suspended_at IS NULL\\n            AND accounts.moved_to_account_id IS NULL\\n          GROUP BY accounts.id\\n          ORDER BY rank DESC\\n          LIMIT ? OFFSET ?\\n\".squish, account.id, account.id, limit, offset])", | ||||
|       "render_path": null, | ||||
| @ -241,6 +261,6 @@ | ||||
|       "note": "" | ||||
|     } | ||||
|   ], | ||||
|   "updated": "2020-12-07 01:17:13 +0100", | ||||
|   "brakeman_version": "4.10.0" | ||||
|   "updated": "2021-05-11 20:22:27 +0900", | ||||
|   "brakeman_version": "5.0.1" | ||||
| } | ||||
|  | ||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user