First published: Wed Jan 10 2018(Updated: )
The lynx gem before 1.0.0 for Ruby places the configured password on command lines, which allows local users to obtain sensitive information by listing processes.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lynx Project Lynx | <1.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5002 is a vulnerability in the lynx gem prior to version 1.0.0 for Ruby that exposes configured passwords on command lines, allowing local users to obtain sensitive information by listing processes.
CVE-2014-5002 has a severity value of 7.8 (High).
CVE-2014-5002 affects the lynx gem versions up to and including 0.4.0 for Ruby.
To fix the CVE-2014-5002 vulnerability, it is recommended to upgrade to version 1.0.0 or higher of the lynx gem for Ruby.
The references for CVE-2014-5002 are: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2014-5002), [GitHub Issue](https://github.com/panthomakos/lynx/issues/3), [Openwall Mailing List](http://www.openwall.com/lists/oss-security/2014/07/07/23).