Skip to content

Local API Login Credentials Disclosure in paratrooper-pingdom

Low severity GitHub Reviewed Published Oct 24, 2017 to the GitHub Advisory Database • Updated Jul 5, 2023

Package

bundler paratrooper-pingdom (RubyGems)

Affected versions

<= 1.0.0

Patched versions

None

Description

The paratrooper-pingdom gem 1.0.0 for Ruby allows local users to obtain the App-Key, username, and password values by listing the curl process.

Vulnerable Code:

From: paratrooper-pingdom-1.0.0/lib/paratrooper-pingdom.rb

def setup(options = {})
  %x[curl https://api.pingdom.com/api/2.0/checks -X PUT -d "paused=true" -H "App-Key: #{app_key}" -u "#{username}:#{password}"]        
end

def teardown(options = {})
  %x[curl https://api.pingdom.com/api/2.0/checks -X PUT -d "paused=false" -H "App-Key: #{app_key}" -u "#{username}:#{password}"]        
end

A malicious user could monitor the process tree to steal the API key, username and password for the API login.

References

Published by the National Vulnerability Database Jan 10, 2014
Published to the GitHub Advisory Database Oct 24, 2017
Reviewed Jun 16, 2020
Last updated Jul 5, 2023

Severity

Low

EPSS score

0.042%
(5th percentile)

Weaknesses

CVE ID

CVE-2014-1233

GHSA ID

GHSA-fqrr-rrwg-69pv

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.