Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWZxcnItcnJ3Zy02OXB2

Local API Login Credentials Disclosure in paratrooper-pingdom

The paratrooper-pingdom gem 1.0.0 for Ruby allows local users to obtain the App-Key, username, and password values by listing the curl process.

Vulnerable Code:

From: paratrooper-pingdom-1.0.0/lib/paratrooper-pingdom.rb

def setup(options = {})
  %x[curl https://api.pingdom.com/api/2.0/checks -X PUT -d "paused=true" -H "App-Key: #{app_key}" -u "#{username}:#{password}"]        
end

def teardown(options = {})
  %x[curl https://api.pingdom.com/api/2.0/checks -X PUT -d "paused=false" -H "App-Key: #{app_key}" -u "#{username}:#{password}"]        
end

A malicious user could monitor the process tree to steal the API key, username and password for the API login.

Permalink: https://github.com/advisories/GHSA-fqrr-rrwg-69pv
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWZxcnItcnJ3Zy02OXB2
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: over 6 years ago
Updated: 10 months ago


Identifiers: GHSA-fqrr-rrwg-69pv, CVE-2014-1233
References: Blast Radius: 1.0

Affected Packages

rubygems:paratrooper-pingdom
Dependent packages: 0
Dependent repositories: 0
Downloads: 3,802 total
Affected Version Ranges: <= 1.0.0
No known fixed version
All affected versions: 1.0.0