kajam allows local users to obtain sensitive information by listing the process
High severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Jan 26, 2023
Description
Published by the National Vulnerability Database
Jan 10, 2018
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Jan 26, 2023
Last updated
Jan 26, 2023
vendor/plugins/dataset/lib/dataset/database/mysql.rb
in the kajam gem 1.0.3.rc2 for Ruby places the mysql user password on the (1) mysqldump command line in the capture function and (2) mysql command line in the restore function, which allows local users to obtain sensitive information by listing the process.References