Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-2125

Опубликовано: 19 апр. 2012
Источник: redhat
CVSS2: 4
EPSS Низкий

Описание

RubyGems before 1.8.23 can redirect HTTPS connections to HTTP, which makes it easier for remote attackers to observe or modify a gem during installation via a man-in-the-middle attack.

Отчет

The Red Hat Security Response Team has rated this issue as having moderate security impact in CloudForms 1.1. This issue is not currently planned to be addressed in future updates.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat CloudForms Tools 1rubygemsWill not fix
Red Hat Subscription Asset ManagerrubygemsWill not fix
Red Hat Enterprise Linux 6rubygemsFixedRHSA-2013:144117.10.2013
Red Hat Enterprise MRG 2cuminFixedRHSA-2013:185217.12.2013
Red Hat Enterprise MRG 2rubygemsFixedRHSA-2013:185217.12.2013
RHEL 6 Version of OpenShift Enterprise 1.2rubygemsFixedRHSA-2013:120304.09.2013

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=814718rubygems: Two security fixes in v1.8.23

EPSS

Процентиль: 70%
0.00638
Низкий

4 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 12 лет назад

RubyGems before 1.8.23 can redirect HTTPS connections to HTTP, which makes it easier for remote attackers to observe or modify a gem during installation via a man-in-the-middle attack.

nvd
почти 12 лет назад

RubyGems before 1.8.23 can redirect HTTPS connections to HTTP, which makes it easier for remote attackers to observe or modify a gem during installation via a man-in-the-middle attack.

debian
почти 12 лет назад

RubyGems before 1.8.23 can redirect HTTPS connections to HTTP, which m ...

github
около 3 лет назад

RubyGems HTTPS to HTTP redirect

oracle-oval
почти 12 лет назад

ELSA-2013-1441: rubygems security update (MODERATE)

EPSS

Процентиль: 70%
0.00638
Низкий

4 Medium

CVSS2