Miggo Logo

CVE-2014-1233: Local API Login Credentials Disclosure in paratrooper-pingdom

2.1

CVSS Score

Basic Information

EPSS Score
0.21461%
Published
10/24/2017
Updated
7/5/2023
KEV Status
No
Technology
TechnologyRuby

Technical Details

CVSS Vector
AV:L/AC:L/Au:N/C:P/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
paratrooper-pingdomrubygems<= 1.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

Both functions use Ruby's %x operator to execute curl commands with interpolated credentials (-u flag and App-Key header). This makes credentials visible in process listings as command-line arguments. The vulnerability documentation specifically identifies these functions as problematic, and the code pattern matches the described exposure mechanism through process monitoring.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** p*r*troop*r-pin**om **m *.*.* *or Ru*y *llows lo**l us*rs to o*t*in t** *pp-K*y, us*rn*m*, *n* p*sswor* v*lu*s *y listin* t** *url pro**ss. ### Vuln*r**l* *o**: *rom: `p*r*troop*r-pin**om-*.*.*/li*/p*r*troop*r-pin**om.r*` ```ru*y *** s*tup(opt

Reasoning

*ot* *un*tions us* Ru*y's %x op*r*tor to *x**ut* *url *omm*n*s wit* int*rpol*t** *r***nti*ls (-u *l** *n* *pp-K*y *****r). T*is m*k*s *r***nti*ls visi*l* in `pro**ss` listin*s *s *omm*n*-lin* *r*um*nts. T** vuln*r**ility *o*um*nt*tion sp**i*i**lly i*