
Research
/Security News
60 Malicious Ruby Gems Used in Targeted Credential Theft Campaign
A RubyGems malware campaign used 60 malicious packages posing as automation tools to steal credentials from social media and marketing tool users.
github.com/namick/obfuscate_id
Make your ActiveRecord ids non-obvious
obfuscate_id turns a URL like this:
http://example.com/users/3
into something like:
http://example.com/users/2356513904
Sequential ActiveRecord ids become non-sequential, random looking, numeric ids.
# post 7000
http://example.com/posts/5270192353
# post 7001
http://example.com/posts/7107163820
# post 7002
http://example.com/posts/3296163828
If your site is scaling well, you might not want to leak that you are getting 50 new posts a minute.
Or, for new websites, you may not want to give away how few people are signed up.
Every website has a third user, but that third user doesn't have to know he is the third user.
Add the gem to your Gemfile.
gem "obfuscate_id"
Run bundler.
bundle install
In your model, add a single line.
class Post < ActiveRecord::Base
obfuscate_id
end
If you want your obfuscated ids to be different than some other website using the same plugin, you can throw a random number (spin) at obfuscate_id to make it hash out unique ids for your app.
class Post < ActiveRecord::Base
obfuscate_id :spin => 89238723
end
obfuscate_id mixes up the ids in a simple, reversable hashing algorithm so that it can then automatically revert the hashed number back to the original id for record lookup without having to store a hash or tag in the database.
Each number from 0 to 9,999,999,999 is paired with one and only one number in that same range. That other number is paired back to the first. This is an example of a minimal perfect hash function. Within a set of ten billion numbers, it simply maps every number to a different 10 digit number, and back again.
Plain record ids are switched to the obfuscated id in the model's to_param
method.
ActiveRecord reverses this obfuscated id back to the plain id before building the database query. This means no migrations or changes to the database. Yay!
to_param
method by passing in the whole object rather than just the id; do this: post_path(@post)
not this: post_path(@post.id)
.This is tested with Rails 4.2.0. For other versions of Rails, please see the releases.
If you are trying to get it to work with a different version of rails that is not tested, let me know in the issues
To run the tests, first clone the repo and run bundler:
git clone git@github.com:namick/obfuscate_id.git
cd obfuscate_id
bundle install
Run the tests
bundle exec rspec spec
Or have Guard run them continuously
bundle exec guard
git checkout -b my-new-feature
)git commit -am 'Add some feature'
)git push origin my-new-feature
)FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
A RubyGems malware campaign used 60 malicious packages posing as automation tools to steal credentials from social media and marketing tool users.
Security News
The CNA Scorecard ranks CVE issuers by data completeness, revealing major gaps in patch info and software identifiers across thousands of vulnerabilities.
Research
/Security News
Two npm packages masquerading as WhatsApp developer libraries include a kill switch that deletes all files if the phone number isn’t whitelisted.