Vulnerability Description
The paratrooper-newrelic gem 1.0.1 for Ruby allows local users to obtain the X-Api-Key value by listing the curl process.
CVSS Score
2.1
LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Paratrooper-Newrelic Project | Paratrooper-Newrelic | 1.0.1 |
Related Weaknesses (CWE)
References
- http://openwall.com/lists/oss-security/2014/01/08/2Exploit
- http://www.vapid.dhs.org/advisories/paratrooper-newrelic-api.htmlExploit
- http://openwall.com/lists/oss-security/2014/01/08/2Exploit
- http://www.vapid.dhs.org/advisories/paratrooper-newrelic-api.htmlExploit
FAQ
What is CVE-2014-1234?
CVE-2014-1234 is a vulnerability with a CVSS score of 2.1 (LOW). The paratrooper-newrelic gem 1.0.1 for Ruby allows local users to obtain the X-Api-Key value by listing the curl process.
How severe is CVE-2014-1234?
CVE-2014-1234 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-1234?
Check the references section above for vendor advisories and patch information. Affected products include: Paratrooper-Newrelic Project Paratrooper-Newrelic.