GHSA-4ph7-5c44-pppv

Suggest an improvement
Source
https://github.com/advisories/GHSA-4ph7-5c44-pppv
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-4ph7-5c44-pppv/GHSA-4ph7-5c44-pppv.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-4ph7-5c44-pppv
Aliases
  • CVE-2014-4999
Published
2022-05-14T03:47:44Z
Modified
2023-11-08T03:57:42.895434Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
kajam allows local users to obtain sensitive information by listing the process
Details

vendor/plugins/dataset/lib/dataset/database/mysql.rb in the kajam gem 1.0.3.rc2 for Ruby places the mysql user password on the (1) mysqldump command line in the capture function and (2) mysql command line in the restore function, which allows local users to obtain sensitive information by listing the process.

References

Affected packages

RubyGems / kajam

Package

Name
kajam
Purl
pkg:gem/kajam

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
1.0.3.rc2

Affected versions

1.*

1.0.3.rc2