|
Message-id: <3C8DA812-61DF-42FD-8478-97154D2A8E1B@me.com> Date: Sat, 14 Dec 2013 17:31:49 -0500 From: "Larry W. Cashdollar" <larry0@...com> To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com> Subject: Bio Basespace SDK 0.1.7 Ruby Gem exposes API Key via command line Title: Bio Basespace SDK 0.1.7 Ruby Gem exposes API Key via command line Date: 11/15/2013 Author: Larry W. Cashdollar, @_larry0 Download: http://rubygems.org/gems/bio-basespace-sdk Description: "BaseSpace Ruby SDK is a Ruby based Software Development Kit to be used in the development of Apps and scripts for working with Illumina's BaseSpace cloud-computing solution for next-gen sequencing data analysis. The primary purpose of the SDK is to provide an easy-to-use Ruby environment enabling developers to authenticate a user, retrieve data, and upload data/results from their own analysis to BaseSpace." Vulnerability: The API client code passes the API_KEY to a curl command. This exposes the api key to the shell and process table. Another user on the system could snag the api key by just monitoring the process table. In the following code snippet: bio-basespace-sdk-0.1.7/lib/basespace/api/api_client.rb # +headers+:: Header of the PUT call. # +trans_file+:: Path to the file that should be transferred. def put_call(resource_path, post_data, headers, trans_file) return %x(curl -H "x-access-token:#{@..._key}" -H "Content-MD5:#{headers['Content-MD5'].strip}" -T "#{trans_file}" -X PUT #{resource_path}) end Vendor: Notified 11/15/2013 Advisory: http://www.vapid.dhs.org/advisories/bio-basespace-sdk.html
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.