CVE-2015-3900 – rubygems-update
Package
Manager: gem
Name: rubygems-update
Vulnerable Version: >=2.0.0 <2.0.16 || >=2.2.0 <2.2.4 || >=2.4.0 <2.4.7
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.02325 pctl0.84218
Details
RubyGems vulnerable to DNS hijack attack RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack attack."
Metadata
Created: 2022-05-14T01:08:49Z
Modified: 2023-03-10T02:29:09Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-wp3j-rvfp-624h/GHSA-wp3j-rvfp-624h.json
CWE IDs: ["CWE-350"]
Alternative ID: GHSA-wp3j-rvfp-624h
Finding: F184
Auto approve: 1