|
Message-ID: <CAG8b5tQ_R_EVdYBK1WONym2d5TzvSHF7JzHtMN3BW=K4=MZ41A@mail.gmail.com> Date: Wed, 2 Jan 2019 11:04:23 +0400 From: Dhiraj Mishra <mishra.dhiraj95@...il.com> To: oss-security@...ts.openwall.com Subject: aria2 leaks passwords for HTTP based authentication Hi List, aria2 is a lightweight multi-protocol command-line utility which leaks data or potential password via `--log=` attribute for HTTP based authentication which might allow local attackers to obtain sensitive information. This issue is somewhat similar to (2019/01/01/1). It was observed that URL's which gets downloaded via `--log=` attribute store’s sensitive information. Example: aria2c --log=file https://user:passwd@...mple.com/ Later CVE-2019-3500 was assigned to this. Thank you @mishradhiraj_
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.