// For flags

CVE-2013-7111

 

Severity Score

5.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The put_call function in the API client (api/api_client.rb) in the BaseSpace Ruby SDK (aka bio-basespace-sdk) gem 0.1.7 for Ruby uses the API_KEY on the command line, which allows remote attackers to obtain sensitive information by listing the processes.

La función put_call en el API del cliente (api/api_client.rb) en la gema BaseSpace Ruby SDK 0.1.7 (también conocida como bio-basespace-sdk) para Ruby, utiliza el API_KEY en la línea de comandos, lo que permite a atacantes remotos obtener información sensible mediante el listado de los procesos.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-12-15 CVE Reserved
  • 2014-04-29 CVE Published
  • 2024-04-27 EPSS Updated
  • 2024-08-06 CVE Updated
  • 2024-08-06 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Basespace Ruby Sdk Project
Search vendor "Basespace Ruby Sdk Project"
Basespace Ruby Sdk
Search vendor "Basespace Ruby Sdk Project" for product "Basespace Ruby Sdk"
0.1.7
Search vendor "Basespace Ruby Sdk Project" for product "Basespace Ruby Sdk" and version "0.1.7"
ruby
Affected