Description
vendor/plugins/dataset/lib/dataset/database/mysql.rb in the kajam gem 1.0.3.rc2 for Ruby places the mysql user password on the (1) mysqldump command line in the capture function and (2) mysql command line in the restore function, which allows local users to obtain sensitive information by listing the process.
Published: 2018-01-10
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-2415 vendor/plugins/dataset/lib/dataset/database/mysql.rb in the kajam gem 1.0.3.rc2 for Ruby places the mysql user password on the (1) mysqldump command line in the capture function and (2) mysql command line in the restore function, which allows local users to obtain sensitive information by listing the process.
Github GHSA Github GHSA GHSA-4ph7-5c44-pppv kajam allows local users to obtain sensitive information by listing the process
History

No history.

Subscriptions

Kajam Project Kajam
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T11:34:37.245Z

Reserved: 2014-07-17T00:00:00.000Z

Link: CVE-2014-4999

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-01-10T18:29:00.650

Modified: 2024-11-21T02:11:14.907

Link: CVE-2014-4999

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses