-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| lean-ruport | rubygems | <= 0.3.8 |
The vulnerability is explicitly tied to code in test/tc_database.rb where the MySQL password is passed as a command-line argument to mysqldump. The provided code snippets (lines 20-21) show unsafe interpolation of credentials into a shell command. While the exact test method name isn't specified in the advisory, the file location and code pattern (command construction + execution via backticks) are clearly identified across multiple sources (CVE, GHSA, and mailing list posts). This matches the CWE-200 exposure vector (sensitive data in process arguments).