RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack attack."
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 02:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.rubygems.org/2015/05/14/CVE-2015-3900.html - Patch, Vendor Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163502.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163600.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164236.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1657.html - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2015/06/26/2 - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/75482 - | |
References | () https://puppet.com/security/cve/CVE-2015-3900 - | |
References | () https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-007/?fid=6356 - Third Party Advisory | |
References | () https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/ - Third Party Advisory |
Information
Published : 2015-06-24 14:59
Updated : 2024-11-21 02:30
NVD link : CVE-2015-3900
Mitre link : CVE-2015-3900
CVE.ORG link : CVE-2015-3900
JSON object : View
Products Affected
redhat
- enterprise_linux
rubygems
- rubygems
oracle
- solaris
ruby-lang
- ruby
CWE
CWE-254
7PK - Security Features