[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2015-4020Date: (C)2015-08-27   (M)2023-12-22


RubyGems 2.0.x before 2.0.17, 2.2.x before 2.2.5, and 2.4.x before 2.4.8 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record with a domain that is suffixed with the original domain name, aka a "DNS hijack attack." NOTE: this vulnerability exists because to an incomplete fix for CVE-2015-3900.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.3
Exploit Score: 8.6
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: NONE
Integrity: PARTIAL
Availability: NONE
  
Reference:
BID-75431
http://blog.rubygems.org/2015/06/08/2.2.5-released.html
http://blog.rubygems.org/2015/06/08/2.4.8-released.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
https://github.com/rubygems/rubygems/commit/5c7bfb5
https://puppet.com/security/cve/CVE-2015-3900
https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-009/?fid=6478
https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/

CPE    22
cpe:/a:rubygems:rubygems:2.0.0:preview2
cpe:/a:rubygems:rubygems:2.2.0
cpe:/a:rubygems:rubygems:2.2.1
cpe:/a:rubygems:rubygems:2.2.4
...
CWE    1
CWE-20
OVAL    3
oval:org.secpod.oval:def:1200060
oval:org.secpod.oval:def:1200026
oval:org.secpod.oval:def:1200054

© SecPod Technologies