RubyGems 2.0.x before 2.0.17, 2.2.x before 2.2.5, and 2.4.x before 2.4.8 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record with a domain that is suffixed with the original domain name, aka a "DNS hijack attack." NOTE: this vulnerability exists because to an incomplete fix for CVE-2015-3900.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.rubygems.org/2015/06/08/2.2.5-released.html - Vendor Advisory | |
References | () http://blog.rubygems.org/2015/06/08/2.4.8-released.html - Vendor Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/75431 - | |
References | () https://github.com/rubygems/rubygems/commit/5c7bfb5 - | |
References | () https://puppet.com/security/cve/CVE-2015-3900 - | |
References | () https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-009/?fid=6478 - Third Party Advisory | |
References | () https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/ - Third Party Advisory |
Information
Published : 2015-08-25 17:59
Updated : 2024-11-21 02:30
NVD link : CVE-2015-4020
Mitre link : CVE-2015-4020
CVE.ORG link : CVE-2015-4020
JSON object : View
Products Affected
rubygems
- rubygems
oracle
- solaris
CWE
CWE-20
Improper Input Validation