oss-sec mailing list archives
Re: echor 0.1.6 Ruby Gem exposes login credentials
From: cve-assign () mitre org
Date: Fri, 31 Jan 2014 09:14:32 -0500 (EST)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
http://www.vapid.dhs.org/advisories/echor-expose-login-creds.html
lib/echor/backplane.rb `curl -u {Echo.backplane_user}:{Echo.backplane_password}
if this gem is used in a rails application a user could get remote command injection simply by putting a semi-colon
Use CVE-2014-1834.
a local user can steal the login credentials just by watching the process table
Use CVE-2014-1835. (This has separate CVEs because the user and password characters could be restricted but still provided on the curl command line.) - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJS663HAAoJEKllVAevmvmsXHkIAINwPIzgJ5MkRgveTKA1mH94 nm4W4JqX4wVao7zmrTw/DEDk2CVyasJsZc9MBIIPKvhb8//Cp8zEShEdkqZHKT3b GKWn5rCi0uO7DDpSfhB+vC2pwSSWxCz817wEhuDJeUb2naZFgTOJtkg/bAgdBtdd f5j1KTQY8VBdI0c+NM0V+Fgdc2BgZGAR56r7KVxFwSQRpCm4jczmXao4JeNQYe32 4gfOaG1M9iK9KHU+1g3yQVV8YH3lKIFZAj4gUeRi14tzntRxq4ar/BOMbTHMU+27 ZHJ9fzcD2Rc8SDPpeDhD+sVW/0QN92apIaqANC9nIBpdoHjDYuu/d0Cf6eXBR0E= =Smf4 -----END PGP SIGNATURE-----
Current thread:
- echor 0.1.6 Ruby Gem exposes login credentials Larry W. Cashdollar (Jan 30)
- Re: echor 0.1.6 Ruby Gem exposes login credentials cve-assign (Jan 31)