oss-sec mailing list archives
Vulnerability Report for Ruby Gem karo-2.3.8
From: larry0 () me com (Larry W. Cashdollar)
Date: Mon, 7 Jul 2014 14:14:36 -0400 (EDT)
Title: Vulnerability Report for Ruby Gem karo-2.3.8 Author: Larry W. Cashdollar, @_larry0 Date: 06/01/2014 OSVDB: 108573 CVE:Please Assign Download: http://rubygems.org/gems/karo Gem Author: rahul.trikha () gmail com From: ./karo-2.3.8/lib/karo/db.rb Line 76 and 95 passes unsanitized user supplied input to the command line. If this gem is used in the context of a rails application malicious input could lead to remote command injection. 073- host = "#{@configuration["user"]}@#{@configuration["host"]}" 74- cmd = "ssh #{host} cat #{server_db_config_file}" 75- 76: server_db_config_output = `#{cmd}` 79- -- 89- def drop_and_create_local_database(local_db_config) 90- command = case local_db_config["adapter"] 91- when "mysql2" 93- when "postgresql" 95- dropdb -h #{local_db_config["host"]} -U #{local_db_config["username"]} --if-exists #{local_db_config["database"]} Advisory: http://www.vapid.dhs.org/advisories/karo-2.3.8.html
Current thread:
- Vulnerability Report for Ruby Gem karo-2.3.8 Larry W. Cashdollar (Jul 07)