Lucene search

K
rubygemsRubySecRUBY:LYNX-2014-5002-108580
HistoryJun 29, 2014 - 8:00 p.m.

lynx Gem for Ruby command/basic.rb Process Table Local Plaintext Password Disclosure

2014-06-2920:00:00
RubySec
nvd.nist.gov
9

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

lynx Gem for Ruby contains a flaw in command/basic.rb that is due to
the application exposing password information in plaintext in the process table.
This may allow a local attacker to gain access to password information.

Affected configurations

Vulners
Node
rubylynxRange1.0.0
VendorProductVersionCPE
rubylynx*cpe:2.3:a:ruby:lynx:*:*:*:*:*:*:*:*

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Related for RUBY:LYNX-2014-5002-108580