lynx doesn't properly sanitize user input and exposes database password to unauthorized users
High severity
GitHub Reviewed
Published
Jan 24, 2018
to the GitHub Advisory Database
•
Updated Sep 5, 2023
Description
Published to the GitHub Advisory Database
Jan 24, 2018
Reviewed
Jun 16, 2020
Last updated
Sep 5, 2023
The lynx gem prior to 1.0.0 for Ruby places the configured password on command lines, which allows local users to obtain sensitive information by listing processes.
As of version 1.0.0, lynx no longer supports a
--password
option. Passwords are only configured in a configuration file, so it's no longer possible to expose passwords on the command line.References