GHSA-wxcw-rqxc-hj85

Suggest an improvement
Source
https://github.com/advisories/GHSA-wxcw-rqxc-hj85
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-wxcw-rqxc-hj85/GHSA-wxcw-rqxc-hj85.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-wxcw-rqxc-hj85
Aliases
Published
2022-05-01T18:31:03Z
Modified
2023-11-01T04:43:40.033534Z
Summary
FTP backend for Duplicity Discloses Passwords to Process Listing
Details

The FTP backend for Duplicity before 0.4.9 sends the password as a command line argument when calling ncftp, which might allow local users to read the password by listing the process and its arguments.

Database specific
{
    "nvd_published_at": "2007-10-04T17:17:00Z",
    "cwe_ids": [
        "CWE-200"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-09-22T21:42:53Z"
}
References

Affected packages

PyPI / duplicity

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.4.9