Lucene search

K
githubGitHub Advisory DatabaseGHSA-XWR3-FMGJ-MMFR
HistoryOct 24, 2017 - 6:33 p.m.

Exposure of Sensitive Information in bio-basespace-sdk

2017-10-2418:33:36
CWE-200
GitHub Advisory Database
github.com
24

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.004 Low

EPSS

Percentile

72.0%

The put_call function in the API client (api/api_client.rb) in the BaseSpace Ruby SDK (aka bio-basespace-sdk) gem 0.1.7 for Ruby uses the API_KEY on the command line, which allows remote attackers to obtain sensitive information by listing the processes.

Affected configurations

Vulners
Node
basespace_ruby_sdk_projectbasespace_ruby_sdkRange0.1.7ruby
CPENameOperatorVersion
bio-basespace-sdkle0.1.7

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.004 Low

EPSS

Percentile

72.0%

Related for GHSA-XWR3-FMGJ-MMFR