Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 31 Jan 2014 09:14:32 -0500 (EST)
From: cve-assign@...re.org
To: larry0@...com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: echor 0.1.6 Ruby Gem exposes login credentials

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> http://www.vapid.dhs.org/advisories/echor-expose-login-creds.html

> lib/echor/backplane.rb
> 
> `curl -u {Echo.backplane_user}:{Echo.backplane_password}

> if this gem is used in a rails application a user could get remote
> command injection simply by putting a semi-colon

Use CVE-2014-1834.


> a local user can steal the login credentials just by watching the
> process table

Use CVE-2014-1835.


(This has separate CVEs because the user and password characters could
be restricted but still provided on the curl command line.)

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJS663HAAoJEKllVAevmvmsXHkIAINwPIzgJ5MkRgveTKA1mH94
nm4W4JqX4wVao7zmrTw/DEDk2CVyasJsZc9MBIIPKvhb8//Cp8zEShEdkqZHKT3b
GKWn5rCi0uO7DDpSfhB+vC2pwSSWxCz817wEhuDJeUb2naZFgTOJtkg/bAgdBtdd
f5j1KTQY8VBdI0c+NM0V+Fgdc2BgZGAR56r7KVxFwSQRpCm4jczmXao4JeNQYe32
4gfOaG1M9iK9KHU+1g3yQVV8YH3lKIFZAj4gUeRi14tzntRxq4ar/BOMbTHMU+27
ZHJ9fzcD2Rc8SDPpeDhD+sVW/0QN92apIaqANC9nIBpdoHjDYuu/d0Cf6eXBR0E=
=Smf4
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ