logo

CVE-2015-3900 rubygems-update

Package

Manager: gem
Name: rubygems-update
Vulnerable Version: >=2.0.0 <2.0.16 || >=2.2.0 <2.2.4 || >=2.4.0 <2.4.7

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.02325 pctl0.84218

Details

RubyGems vulnerable to DNS hijack attack RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack attack."

Metadata

Created: 2022-05-14T01:08:49Z
Modified: 2023-03-10T02:29:09Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-wp3j-rvfp-624h/GHSA-wp3j-rvfp-624h.json
CWE IDs: ["CWE-350"]
Alternative ID: GHSA-wp3j-rvfp-624h
Finding: F184
Auto approve: 1