The Ruby http gem before 0.7.3 does not verify hostnames in SSL connections, which might allow remote attackers to obtain sensitive information via a man-in-the-middle-attack.
References
Link | Resource |
---|---|
https://github.com/ruby/openssl/issues/8 | Issue Tracking Third Party Advisory |
https://groups.google.com/forum/#%21topic/httprb/jkb4oxwZjkU | |
https://rubysec.com/advisories/http-CVE-2015-1828 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-10-06 22:29
Updated : 2024-02-04 19:29
NVD link : CVE-2015-1828
Mitre link : CVE-2015-1828
CVE.ORG link : CVE-2015-1828
JSON object : View
Products Affected
http.rb_project
- http.rb
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor