GSD-2019-16060
Vulnerability from gsd - Updated: 2019-04-10 00:00Details
A flaw in airbrake-ruby v4.2.3 prevented user data from being filtered
prior to sending to Airbrake. Such data could be user passwords. Therefore, an app
could leak user passwords without knowing it.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2019-16060",
"description": "The Airbrake Ruby notifier 4.2.3 for Airbrake mishandles the blacklist_keys configuration option and consequently may disclose passwords to unauthorized actors. This is fixed in 4.2.4 (also, 4.2.2 and earlier are unaffected).",
"id": "GSD-2019-16060"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"affected": [
{
"package": {
"ecosystem": "RubyGems",
"name": "airbrake-ruby",
"purl": "pkg:gem/airbrake-ruby"
}
}
],
"aliases": [
"CVE-2019-16060",
"GHSA-2p82-v77v-mppr"
],
"details": "A flaw in airbrake-ruby v4.2.3 prevented user data from being filtered\nprior to sending to Airbrake. Such data could be user passwords. Therefore, an app\ncould leak user passwords without knowing it.\n",
"id": "GSD-2019-16060",
"modified": "2019-04-10T00:00:00.000Z",
"published": "2019-04-10T00:00:00.000Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/airbrake/airbrake-ruby/issues/468"
},
{
"type": "WEB",
"url": "https://github.com/airbrake/airbrake-ruby/pull/469"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": 9.8,
"type": "CVSS_V3"
}
],
"summary": "Blacklist keys are no longer being filtered in airbrake-ruby"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-16060",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Airbrake Ruby notifier 4.2.3 for Airbrake mishandles the blacklist_keys configuration option and consequently may disclose passwords to unauthorized actors. This is fixed in 4.2.4 (also, 4.2.2 and earlier are unaffected)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/airbrake/airbrake-ruby/issues/468",
"refsource": "MISC",
"url": "https://github.com/airbrake/airbrake-ruby/issues/468"
}
]
}
},
"github.com/rubysec/ruby-advisory-db": {
"cve": "2019-16060",
"cvss_v3": 9.8,
"date": "2019-04-10",
"description": "A flaw in airbrake-ruby v4.2.3 prevented user data from being filtered\nprior to sending to Airbrake. Such data could be user passwords. Therefore, an app\ncould leak user passwords without knowing it.\n",
"gem": "airbrake-ruby",
"ghsa": "2p82-v77v-mppr",
"patched_versions": [
"\u003e= 4.2.4"
],
"related": {
"url": [
"https://github.com/airbrake/airbrake-ruby/pull/469"
]
},
"title": "Blacklist keys are no longer being filtered in airbrake-ruby",
"unaffected_versions": [
"\u003c 4.2.3",
"\u003e 4.2.3"
],
"url": "https://github.com/airbrake/airbrake-ruby/issues/468"
},
"gitlab.com": {
"advisories": [
{
"affected_range": "=4.2.3",
"affected_versions": "Version 4.2.3",
"cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-937"
],
"date": "2019-09-09",
"description": "The Airbrake Ruby notifier mishandles the `blacklist_keys` configuration option and consequently may disclose passwords to unauthorized actors.",
"fixed_versions": [
"4.2.4"
],
"identifier": "CVE-2019-16060",
"identifiers": [
"CVE-2019-16060"
],
"not_impacted": "All versions before 4.2.3, all versions after 4.2.3",
"package_slug": "gem/airbrake-ruby",
"pubdate": "2019-09-06",
"solution": "Upgrade to version 4.2.4 or above.",
"title": "Information leakage",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2019-16060",
"https://github.com/airbrake/airbrake-ruby/issues/468"
],
"uuid": "08dd9fbd-76d2-49d9-a4df-1d2fa16ad214"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:airbrake:airbrake_ruby:4.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-16060"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The Airbrake Ruby notifier 4.2.3 for Airbrake mishandles the blacklist_keys configuration option and consequently may disclose passwords to unauthorized actors. This is fixed in 4.2.4 (also, 4.2.2 and earlier are unaffected)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/airbrake/airbrake-ruby/issues/468",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/airbrake/airbrake-ruby/issues/468"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2020-08-24T17:37Z",
"publishedDate": "2019-09-06T19:15Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…