{"id":"DEBIAN-CVE-2015-3448","details":"REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log.","modified":"2026-04-28T20:15:50.754724Z","published":"2015-04-29T20:59:06.173Z","upstream":["CVE-2015-3448"],"references":[{"type":"ADVISORY","url":"https://security-tracker.debian.org/tracker/CVE-2015-3448"}],"affected":[{"package":{"name":"ruby-rest-client","ecosystem":"Debian:11","purl":"pkg:deb/debian/ruby-rest-client?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.8.0-1"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2015-3448.json"}},{"package":{"name":"ruby-rest-client","ecosystem":"Debian:12","purl":"pkg:deb/debian/ruby-rest-client?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.8.0-1"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2015-3448.json"}},{"package":{"name":"ruby-rest-client","ecosystem":"Debian:13","purl":"pkg:deb/debian/ruby-rest-client?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.8.0-1"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2015-3448.json"}},{"package":{"name":"ruby-rest-client","ecosystem":"Debian:14","purl":"pkg:deb/debian/ruby-rest-client?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.8.0-1"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2015-3448.json"}}],"schema_version":"1.7.5"}