|
Message-id: <CECB5160-E586-4116-ADCF-A454BB13761F@me.com> Date: Tue, 07 Jan 2014 20:43:47 -0500 From: "Larry W. Cashdollar" <larry0@...com> To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com> Subject: Paratrooper-newrelic 1.0.1 Ruby Gem exposes API key Title: Paratrooper-newrelic 1.0.1 Ruby Gem exposes API key Author: Larry W. Cashdollar, @_larry0 CVE: Please assign one. Download: http://rubygems.org/gems/paratrooper-newrelic Description: "Send deploy notifications to Newrelic service when deploying with Paratrooper." Vulnerable Code: From paratrooper-newrelic-1.0.1/lib/paratrooper-newrelic.rb: lines 25 and 29 expose the API key, a malicious user can monitor the process tree and steal the API key. 24 def setup(options = {}) 25 %x[curl https://heroku.newrelic.com/accounts/#{account_id}/applications/#{application_id}/ping_targets/disable -X POST -H "X-Api-Key: #{api_key} "] 26 end 27 28 def teardown(options = {}) 29 %x[curl https://heroku.newrelic.com/accounts/#{account_id}/applications/#{application_id}/ping_targets/enable -X POST -H "X-Api-Key: #{api_key}" ] 30 end Advisory: http://www.vapid.dhs.org/advisories/paratrooper-newrelic-api.html
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.