Paratrooper-newrelic 1.0.1 Ruby Gem exposes API key

2014.01.09
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-200


CVSS Base Score: 2.1/10
Impact Subscore: 2.9/10
Exploitability Subscore: 3.9/10
Exploit range: Local
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: None
Availability impact: None

Title: Paratrooper-newrelic 1.0.1 Ruby Gem exposes API key Author: Larry W. Cashdollar, @_larry0 CVE: Please assign one. Download: http://rubygems.org/gems/paratrooper-newrelic Description: "Send deploy notifications to Newrelic service when deploying with Paratrooper." Vulnerable Code: From paratrooper-newrelic-1.0.1/lib/paratrooper-newrelic.rb: lines 25 and 29 expose the API key, a malicious user can monitor the process tree and steal the API key. 24 def setup(options = {}) 25 %x[curl https://heroku.newrelic.com/accounts/#{account_id}/applications/#{application_id}/ping_targets/disable -X POST -H "X-Api-Key: #{api_key} "] 26 end 27 28 def teardown(options = {}) 29 %x[curl https://heroku.newrelic.com/accounts/#{account_id}/applications/#{application_id}/ping_targets/enable -X POST -H "X-Api-Key: #{api_key}" ] 30 end Advisory: http://www.vapid.dhs.org/advisories/paratrooper-newrelic-api.html

References:

http://www.vapid.dhs.org/advisories/paratrooper-newrelic-api.html
http://seclists.org/oss-sec/2014/q1/53


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top