|
|
Message-id: <C8480EAF-453C-4417-8099-D73E11016A46@me.com>
Date: Tue, 07 Jan 2014 19:57:03 -0500
From: "Larry W. Cashdollar" <larry0@...com>
To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>
Subject: paratrooper-pingdom-1.0.0 ruby gem exposes API login credentials
Title: paratrooper-pingdom-1.0.0 ruby gem exposes API login credentials
Author: Larry W. Cashdollar, @_larry0
Date: 12/26/2013
CVE: Please assign.
Download: http://rubygems.org/gems/paratrooper-pingdom
Description: "Send deploy notifications to Pingdom service when deploying with Paratrooper"
Vulnerable Code:
From: paratrooper-pingdom-1.0.0/lib/paratrooper-pingdom.rb
24 def setup(options = {})
25 %x[curl
https://api.pingdom.com/api/2.0/checks -X PUT -d "paused=tru e" -H "App-Key: {app_key}" -u "
{username}:#{password}"]
26 end
27
28 def teardown(options = {})
29 %x[curl
https://api.pingdom.com/api/2.0/checks -X PUT -d "paused=fal se" -H "App-Key: {app_key}" -u "
{username}:#{password}"]
30 end
A malicious user could monitor the process tree to steal the API key, username and password for the API login.
http://www.vapid.dhs.org/advisories/paratrooper-api-key-pingdom.html
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.