oss-sec mailing list archives

Vulnerability Report for Ruby Gem codders-dataset-1.3.2.1


From: larry0 () me com (Larry W. Cashdollar)
Date: Mon, 7 Jul 2014 14:13:47 -0400 (EDT)

Title: Vulnerability Report for Ruby Gem codders-dataset-1.3.2.1

Author: Larry W. Cashdollar, @_larry0

Date: 06/01/2014

OSVDB: 108582

CVE:Please Assign

Download: http://rubygems.org/gems/codders-dataset

Gem Author:  codders () octomonkey org uk

From: ./codders-dataset-1.3.2.1/lib/dataset/database/postgresql.rb

Lines 18 and 24 expose the password to the process table, and are vulnerable to command injection if used in the 
context of a rails application. The #{@username} and #{@password} variables aren't properly sanitized before being 
passed to the command line.

015-      
16-      def capture(datasets)
17-        return if datasets.nil? || datasets.empty?
18:        `pg_dump -c #{@database} > #{storage_path(datasets)}`
19-      end
20-      
21-      def restore(datasets)
22-        store = storage_path(datasets)
23-        if File.file?(store)
24:          `psql -U #{@username} -p #{@password} -e #{@database} < #{store}`
25-          true
26-        end
27-      end


Advisory: http://www.vapid.dhs.org/advisories/codders-dataset-1.3.2.1.html


Current thread: