lib/cap-strap/helpers.rb in the cap-strap gem 0.1.5 for Ruby places credentials on the useradd command line, which allows local users to obtain sensitive information by listing the process.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2014/07/07/9 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2014/07/17/5 | third party advisory mailing list |
http://www.vapid.dhs.org/advisories/cap-strap-0.1.5.html | third party advisory exploit |