Description
vendor/plugins/dataset/lib/dataset/database/mysql.rb in the kajam gem 1.0.3.rc2 for Ruby places the mysql user password on the (1) mysqldump command line in the capture function and (2) mysql command line in the restore function, which allows local users to obtain sensitive information by listing the process.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-2415 | vendor/plugins/dataset/lib/dataset/database/mysql.rb in the kajam gem 1.0.3.rc2 for Ruby places the mysql user password on the (1) mysqldump command line in the capture function and (2) mysql command line in the restore function, which allows local users to obtain sensitive information by listing the process. |
Github GHSA |
GHSA-4ph7-5c44-pppv | kajam allows local users to obtain sensitive information by listing the process |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T11:34:37.245Z
Reserved: 2014-07-17T00:00:00.000Z
Link: CVE-2014-4999
No data.
Status : Modified
Published: 2018-01-10T18:29:00.650
Modified: 2024-11-21T02:11:14.907
Link: CVE-2014-4999
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA