Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-4020

Опубликовано: 18 мая 2015
Источник: redhat
CVSS2: 7.9

Описание

RubyGems 2.0.x before 2.0.17, 2.2.x before 2.2.5, and 2.4.x before 2.4.8 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record with a domain that is suffixed with the original domain name, aka a "DNS hijack attack." NOTE: this vulnerability exists because to an incomplete fix for CVE-2015-3900.

A flaw was found in a way rubygems verified the API endpoint hostname retrieved through a DNS SRV record. A man-in-the-middle attacker could use this flaw to force a client to download content from an untrusted domain.

Отчет

This issue did not affect the versions of rubygems as shipped with Red Hat Enterprise Linux 6, Red Hat Enterprise MRG 2.5, Red Hat Satellite 6, Red Hat Openstack 5, Red Hat Openshift Enterprise 2, as the packages did not include the incomplete fix. This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5, 6 and 7, Red Hat Subscription Asset Manager and Red Hat Software Collections, as the packages did not include the incomplete fix.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5rubygemsNot affected
OpenStack ForemanrubygemsNot affected
Red Hat Enterprise Linux 5rubyNot affected
Red Hat Enterprise Linux 6rubyNot affected
Red Hat Enterprise Linux 6rubygemsNot affected
Red Hat Enterprise Linux 7rubyNot affected
Red Hat Enterprise Linux OpenStack Platform 5 (Icehouse)rubygemsNot affected
Red Hat Enterprise MRG 2rubygemsNot affected
Red Hat OpenShift Enterprise 2rubygemsNot affected
Red Hat Satellite 6rubygemsNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20->CWE-345
https://bugzilla.redhat.com/show_bug.cgi?id=1250109rubygems: incomplete fix for CVE-2015-3900

7.9 High

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

RubyGems 2.0.x before 2.0.17, 2.2.x before 2.2.5, and 2.4.x before 2.4.8 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record with a domain that is suffixed with the original domain name, aka a "DNS hijack attack." NOTE: this vulnerability exists because to an incomplete fix for CVE-2015-3900.

nvd
больше 10 лет назад

RubyGems 2.0.x before 2.0.17, 2.2.x before 2.2.5, and 2.4.x before 2.4.8 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record with a domain that is suffixed with the original domain name, aka a "DNS hijack attack." NOTE: this vulnerability exists because to an incomplete fix for CVE-2015-3900.

debian
больше 10 лет назад

RubyGems 2.0.x before 2.0.17, 2.2.x before 2.2.5, and 2.4.x before 2.4 ...

github
больше 3 лет назад

RubyGems Improper Input Validation vulnerability

7.9 High

CVSS2