Описание
The lynx gem before 1.0.0 for Ruby places the configured password on command lines, which allows local users to obtain sensitive information by listing processes.
Ссылки
- ExploitMailing ListThird Party Advisory
- ExploitMailing ListThird Party Advisory
- ExploitThird Party Advisory
- Third Party Advisory
- ExploitMailing ListThird Party Advisory
- ExploitMailing ListThird Party Advisory
- ExploitThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.0.0 (исключая)
cpe:2.3:a:lynx_project:lynx:*:*:*:*:*:ruby:*:*
EPSS
Процентиль: 24%
0.00078
Низкий
7.8 High
CVSS3
2.1 Low
CVSS2
Дефекты
CWE-255
Связанные уязвимости
CVSS3: 7.8
github
около 8 лет назад
lynx doesn't properly sanitize user input and exposes database password to unauthorized users
EPSS
Процентиль: 24%
0.00078
Низкий
7.8 High
CVSS3
2.1 Low
CVSS2
Дефекты
CWE-255