Show plain JSON{"id": "CVE-2015-3900", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2015-06-24T14:59:01.190", "references": [{"url": "http://blog.rubygems.org/2015/05/14/CVE-2015-3900.html", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163502.html", "source": "cve@mitre.org"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163600.html", "source": "cve@mitre.org"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164236.html", "source": "cve@mitre.org"}, {"url": "http://rhn.redhat.com/errata/RHSA-2015-1657.html", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.openwall.com/lists/oss-security/2015/06/26/2", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/75482", "source": "cve@mitre.org"}, {"url": "https://puppet.com/security/cve/CVE-2015-3900", "source": "cve@mitre.org"}, {"url": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-007/?fid=6356", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://blog.rubygems.org/2015/05/14/CVE-2015-3900.html", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163502.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163600.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164236.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2015-1657.html", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2015/06/26/2", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/75482", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://puppet.com/security/cve/CVE-2015-3900", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-007/?fid=6356", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-254"}]}], "descriptions": [{"lang": "en", "value": "RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a \"DNS hijack attack.\""}, {"lang": "es", "value": "RubyGems 2.0.x en versiones anteriores a 2.0.16, 2.2.x en versiones anteriores a 2.2.4 y 2.4.x en versiones anteriores a 2.4.7 no valida el nombre de host al recuperar gemas o hacer solicitudes de API, lo que permite a atacantes remotos redireccionar peticiones a dominios arbitrarios a trav\u00e9s del registro DNS SRV manipulado, tambi\u00e9n conocido como un \"ataque de secuestro de DNS\"."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9237145-35F8-4E05-B730-77C0F386E5B2"}, {"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C78BB1D8-0505-484D-B824-1AA219F8B247"}, {"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5178D04D-1C29-4353-8987-559AA07443EC"}, {"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0535DC9-EB0E-4745-80AC-4A020DF26E38"}, {"criteria": "cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B03B7561-A854-4EFA-9E4E-CFC4EEAE4EE1"}, {"criteria": "cpe:2.3:a:ruby-lang:ruby:2.1:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "77020036-DC99-461B-9A36-E8C0BE44E6B8"}, {"criteria": "cpe:2.3:a:ruby-lang:ruby:2.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8DF046E4-503B-4A10-BEAB-3144BD86EA49"}, {"criteria": "cpe:2.3:a:ruby-lang:ruby:2.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9FCA45F1-3038-413A-B8C3-EE366A4E6248"}, {"criteria": "cpe:2.3:a:ruby-lang:ruby:2.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF6AF5E3-4EB8-48A3-B8E9-C79C08C38994"}, {"criteria": "cpe:2.3:a:ruby-lang:ruby:2.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6AE2B154-8126-4A38-BAB6-915207764FC0"}, {"criteria": "cpe:2.3:a:ruby-lang:ruby:2.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "808FA8BE-71FC-4ADD-BDEA-637E8DF4E899"}, {"criteria": "cpe:2.3:a:ruby-lang:ruby:2.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8F103B7-0E70-4490-9802-2CD6034E240B"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:rubygems:rubygems:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F2D82506-3FB5-41BA-8704-CC324C0B0DB2"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "260A155C-ED09-44E7-8279-5B94A4AC8CA4"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4E0506F-F2E6-45A2-B637-576C341A71B7"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2EC4513-B653-438A-A1E4-406D055FC160"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5FDF363-24FA-45D2-879B-B1CF9B667AE2"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "03A81F55-2B6B-467C-9281-AA11ED31220F"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8143D88-890D-4C87-9120-46B33D7D63C8"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E5608F5-AC8A-4368-9323-A2CC09F18AAD"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0ACEEB4D-D21D-4D89-881A-9FC33121F69C"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE3D1495-E577-492F-ADE1-B8E8FB7F241A"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCD623FF-E72B-4C63-B9E6-AFCDEFDD760A"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EAA1E4C2-29CA-48C2-AFFA-5357B36655FB"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.0.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB358B7A-D258-4B86-BBD9-09388109653A"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.0.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C608597-03F7-4F01-803F-0E2B1E9E1D30"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67C95ABA-1949-4B56-B9E3-44B4AF90274D"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.0.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD319AE0-3D8C-40DF-857D-C38EAFA88C68"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "672CC7FA-188C-4F34-B10D-7E0C4E7857F4"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FFCFF897-E65B-4D58-BA4D-B08FEF1201B6"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B6D0730-F774-4E29-9871-3FF4BA89981E"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D692C10-A24E-48EA-887C-7333C772744C"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5AFD153C-B0C3-4A91-8B09-839341FA4434"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04D0BF47-C818-4834-BFA2-23DD25386CCC"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F54C49A-12CE-4AC5-A94A-9C5921414AC6"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9CFF3F39-EF40-4D73-965F-98A51C39C02F"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35BCB8FC-EE9C-4AA4-A4A0-E20A3E557129"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5B90365-2172-43E3-870B-A16F9FB45FD8"}, {"criteria": "cpe:2.3:a:rubygems:rubygems:2.4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4932202-9EEA-4B95-A24A-637678837179"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79A602C5-61FE-47BA-9786-F045B6C6DBA8"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}