Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fqrr-rrwg-69pv

Опубликовано: 24 окт. 2017
Источник: github
Github: Прошло ревью

Описание

Local API Login Credentials Disclosure in paratrooper-pingdom

The paratrooper-pingdom gem 1.0.0 for Ruby allows local users to obtain the App-Key, username, and password values by listing the curl process.

Vulnerable Code:

From: paratrooper-pingdom-1.0.0/lib/paratrooper-pingdom.rb

def setup(options = {}) %x[curl https://api.pingdom.com/api/2.0/checks -X PUT -d "paused=true" -H "App-Key: #{app_key}" -u "#{username}:#{password}"] end def teardown(options = {}) %x[curl https://api.pingdom.com/api/2.0/checks -X PUT -d "paused=false" -H "App-Key: #{app_key}" -u "#{username}:#{password}"] end

A malicious user could monitor the process tree to steal the API key, username and password for the API login.

Пакеты

Наименование

paratrooper-pingdom

rubygems
Затронутые версииВерсия исправления

<= 1.0.0

Отсутствует

EPSS

Процентиль: 21%
0.00068
Низкий

Дефекты

CWE-200

Связанные уязвимости

nvd
около 12 лет назад

The paratrooper-pingdom gem 1.0.0 for Ruby allows local users to obtain the App-Key, username, and password values by listing the curl process.

EPSS

Процентиль: 21%
0.00068
Низкий

Дефекты

CWE-200