|
Message-Id: <20140707181341.5CA2F1A41139@me.com> Date: Mon, 7 Jul 2014 14:13:41 -0400 (EDT) From: larry0@...com (Larry W. Cashdollar) To: <oss-security@...ts.openwall.com> Subject: Vulnerability Report for Ruby Gem codders-dataset-1.3.2.1 Title: Vulnerability Report for Ruby Gem codders-dataset-1.3.2.1 Author: Larry W. Cashdollar, @_larry0 Date: 06/01/2014 OSVDB: 108583 CVE:Please Assign Download: http://rubygems.org/gems/codders-dataset Gem Author: codders@...omonkey.org.uk From: ./codders-dataset-1.3.2.1/lib/dataset/database/mysql.rb Lines 18 and 24 expose the password to the process table, and are vulnerable to command injection if used in the context of a rails application. The #{@...rname} and #{@...sword} variables aren't properly sanitized before being passed to the command line. 015- 16- def capture(datasets) 17- return if datasets.nil? || datasets.empty? 18: `mysqldump -u #{@...rname} --password=#{@...sword} --compact --extended-insert --no-create-db --add-drop-table --quick --quote-names #{@...abase} > #{storage_path(datasets)}` 19- end 20- 21- def restore(datasets) 22- store = storage_path(datasets) 23- if File.file?(store) 24: `mysql -u #{@...rname} --password=#{@...sword} --database=#{@...abase} < #{store}` 25- true 26- end 27- end Advisory: http://www.vapid.dhs.org/advisories/codders-dataset-1.3.2.1.html
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.