|
Message-id: <330033C2-D929-4392-ADA6-374430E648DB@me.com> Date: Thu, 30 Jan 2014 13:22:26 -0500 From: "Larry W. Cashdollar" <larry0@...com> To: oss-security@...ts.openwall.com Subject: echor 0.1.6 Ruby Gem exposes login credentials Title: echor 0.1.6 Ruby Gem exposes login credentials Date: 1/14/2014 CVE: Please assign one. Author: Larry W. Cashdollar, @_larry0 Download: http://rubygems.org/gems/echor Description: Echo ruby wrapper Vulnerability in file echor-0.1.6/lib/echor/backplane.rb: The function perform_request passes sensitive data to the shell and unsanitized user input, if this gem is used in a rails application a user could get remote command injection simply by putting a semi-colon in their username or password. At a minimum a local user can steal the login credentials just by watching the process table on the system. 45 def perform_request(data) 46 JSON.parse(`curl -u {Echo.backplane_user}: {Echo.backplane_password} --data-binary '#{data}' #{@...nnel}`) 47 end Vendor: Not notified, I don't think this Gem is maintained anymore. Advisory: http://www.vapid.dhs.org/advisories/echor-expose-login-creds.html
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.