Vulnerability CVE-2014-4999


Published: 2018-01-10

Description:
vendor/plugins/dataset/lib/dataset/database/mysql.rb in the kajam gem 1.0.3.rc2 for Ruby places the mysql user password on the (1) mysqldump command line in the capture function and (2) mysql command line in the restore function, which allows local users to obtain sensitive information by listing the process.

Type:

CWE-200

(Information Exposure)

CVSS2 => (AV:L/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.1/10
2.9/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Kajam project -> Kajam 

 References:
http://www.openwall.com/lists/oss-security/2014/07/07/19
http://www.openwall.com/lists/oss-security/2014/07/17/5
http://www.vapid.dhs.org/advisories/kajam-1.0.3.rc2.html

Copyright 2024, cxsecurity.com

 

Back to Top