|
|
|
Message-Id: <20140707181444.6FF041A41139@me.com>
Date: Mon, 7 Jul 2014 14:14:44 -0400 (EDT)
From: larry0@...com (Larry W. Cashdollar)
To: <oss-security@...ts.openwall.com>
Subject: Vulnerability Report for Ruby Gem kajam-1.0.3.rc2
Title: Vulnerability Report for Ruby Gem kajam-1.0.3.rc2
Author: Larry W. Cashdollar, @_larry0
Date: 06/01/2014
OSVDB: 108530
CVE:Please Assign
Download: http://rubygems.org/gems/kajam
Gem Author: scienceblock@...il.com
From: ./kajam-1.0.3.rc2/vendor/plugins/dataset/lib/dataset/database/mysql.rb
Lines 18 and 24 expose the mysql user password to the process table via #{@...sword}. If this Gem is used in the context of a rails application it maybe possible to inject commands via user supplied input as these variables are not sanitized before being passed to the shell.
015-
16- def capture(datasets)
17- return if datasets.nil? || datasets.empty?
18: `mysqldump -u #{@...rname} --password=#{@...sword} --compact --extended-insert --no-create-db --add-drop-table --quick --quote-names #{@...abase} > #{storage_path(datasets)}`
19- end
20-
21- def restore(datasets)
22- store = storage_path(datasets)
23- if File.file?(store)
24: `mysql -u #{@...rname} --password=#{@...sword} --database=#{@...abase} < #{store}`
25- true
26- end
27- end
Advisory: http://www.vapid.dhs.org/advisories/kajam-1.0.3.rc2.html
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.