Lucene search

K
githubGitHub Advisory DatabaseGHSA-FQRR-RRWG-69PV
HistoryOct 24, 2017 - 6:33 p.m.

Local API Login Credentials Disclosure in paratrooper-pingdom

2017-10-2418:33:36
CWE-200
GitHub Advisory Database
github.com
15

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

EPSS

0

Percentile

5.1%

The paratrooper-pingdom gem 1.0.0 for Ruby allows local users to obtain the App-Key, username, and password values by listing the curl process.

Vulnerable Code:

From: paratrooper-pingdom-1.0.0/lib/paratrooper-pingdom.rb

def setup(options = {})
  %x[curl https://api.pingdom.com/api/2.0/checks -X PUT -d "paused=true" -H "App-Key: #{app_key}" -u "#{username}:#{password}"]        
end

def teardown(options = {})
  %x[curl https://api.pingdom.com/api/2.0/checks -X PUT -d "paused=false" -H "App-Key: #{app_key}" -u "#{username}:#{password}"]        
end

A malicious user could monitor the process tree to steal the API key, username and password for the API login.

Affected configurations

Vulners
Node
tobias_maierparatrooper-pingdomRange1.0.0ruby
VendorProductVersionCPE
tobias_maierparatrooper-pingdom*cpe:2.3:a:tobias_maier:paratrooper-pingdom:*:*:*:*:*:ruby:*:*

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

EPSS

0

Percentile

5.1%

Related for GHSA-FQRR-RRWG-69PV