Advisory #: 86
Title: Paratrooper-newrelic 1.0.1 Ruby Gem exposes API key
Author: Larry W. Cashdollar, @_larry0
Date: 2014-01-08
CVE-ID:[CVE-2014-1234]
CWE: CWE-200 Information Leak / Disclosure
Download Site: http://rubygems.org/gems/paratrooper-newrelic
Vendor: Brandon Farmer, Matt Polito
Vendor Notified: 2014-01-08
Vendor Contact: matt.polito@gmail.com
Advisory: http://www.vapid.dhs.org/advisories/paratrooper-newrelic-api.html
Description: Send deploy notifications to Newrelic service when deploying with Paratrooper.
Vulnerability:
From paratrooper-newrelic-1.0.1/lib/paratrooper-newrelic.rb: lines 25 and 29 expose the API key to the command line where a malicious user can monitor the process tree and steal the login credentials. 24 def setup(options = {}) 25 %x[curl https://heroku.newrelic.com/accounts/#{account_id}/applications/#{application_id}/ping_targets/disable -X POST -H "X-Api-Key: {api_key} "] 26 end 27 28 def teardown(options = {}) 29 %x[curl https://heroku.newrelic.com/accounts/#{account_id}/applications/#{application_id}/ping_targets/enable -X POST -H "X-Api-Key: #{api_key}" ] 30 end
Export: JSON TEXT XML
Exploit Code:
  1.  
Screen Shots:
Notes:
101839