Local Plaintext Password Disclosure Affecting kajam package, versions >= 0


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (17th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Local Plaintext Password Disclosure vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-KAJAM-20170
  • published29 Jun 2014
  • disclosed29 Jun 2014
  • creditUnknown

Introduced: 29 Jun 2014

CVE-2014-4999  (opens in a new tab)
CWE-200  (opens in a new tab)

Overview

kajam is a lightweight content management system for middle and small teams. Affected versions of this gem expose the MySQL or PostgreSQL password in the process list, due to a flaw in /dataset/lib/dataset/database/postgresql.rb. This may allow a local attacker to gain access to password information.

CVSS Base Scores

version 3.1