Описание
EM-HTTP-Request 1.1.5 uses the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified.
Ссылки
- ExploitIssue TrackingPatchThird Party Advisory
- ExploitThird Party Advisory
- ExploitIssue TrackingPatchThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:em-http-request_project:em-http-request:1.1.5:*:*:*:*:*:*:*
Конфигурация 2
Одно из
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
EPSS
Процентиль: 34%
0.00139
Низкий
7.4 High
CVSS3
5.8 Medium
CVSS2
Дефекты
CWE-295
Связанные уязвимости
CVSS3: 7.4
redhat
больше 5 лет назад
EM-HTTP-Request 1.1.5 uses the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified.
CVSS3: 7.4
github
больше 4 лет назад
Improper Certificate Validation in EM-HTTP-Request
EPSS
Процентиль: 34%
0.00139
Низкий
7.4 High
CVSS3
5.8 Medium
CVSS2
Дефекты
CWE-295