Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-13482

Опубликовано: 24 мая 2020
Источник: redhat
CVSS3: 7.4
EPSS Низкий

Описание

EM-HTTP-Request 1.1.5 uses the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified.

A flaw was found in rubygem-em-http-request. The eventmachine library does not verify the hostname in a TLS server certificate which can allow an attacker to perform a man-in-the-middle attack. The highest threat from this vulnerability is to data confidentiality and integrity.

Меры по смягчению последствий

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.

Дополнительная информация

Статус:

Important
Дефект:
CWE-297
https://bugzilla.redhat.com/show_bug.cgi?id=1911457rubygem-em-http-request: missing SSL hostname validation allows MITM

EPSS

Процентиль: 34%
0.00139
Низкий

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.4
nvd
больше 5 лет назад

EM-HTTP-Request 1.1.5 uses the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified.

CVSS3: 7.4
github
больше 4 лет назад

Improper Certificate Validation in EM-HTTP-Request

EPSS

Процентиль: 34%
0.00139
Низкий

7.4 High

CVSS3