Lucene search

K
rubygemsRubySecRUBY:KAFO-2014-0135-106826
HistoryMar 12, 2014 - 8:00 p.m.

CVE-2014-0135 rubygem-kafo: temporary file creation vulnerability when creating /tmp/default_values.yaml

2014-03-1220:00:00
RubySec
nvd.nist.gov
6

CVSS2

1.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

EPSS

0

Percentile

5.1%

Kafo before 0.3.17 and 0.4.x before 0.5.2, as used by Foreman, uses world-readable
permissions for default_values.yaml, which allows local users to obtain passwords
and other sensitive information by reading the file.

Affected configurations

Vulners
Node
rubykafoRange0.3.00.3.17
OR
rubykafoRange0.5.2
VendorProductVersionCPE
rubykafo*cpe:2.3:a:ruby:kafo:*:*:*:*:*:*:*:*

CVSS2

1.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

EPSS

0

Percentile

5.1%

Related for RUBY:KAFO-2014-0135-106826