Sha256: 8a89117f3ee9859d6125ac40e32eb8e252bb87a6a77ddc7ed4f7031f0a41b222
Contents?: true
Size: 767 Bytes
Versions: 1
Compression:
Stored size: 767 Bytes
Contents
--- gem: rubygems-update library: rubygems cve: 2015-4020 url: https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-009/?fid=6478 title: | RubyGems remote_fetcher.rb api_endpoint() Function Missing SRV Record Hostname Validation Request Hijacking date: 2015-06-08 description: | RubyGems contains a flaw in the api_endpoint() function in remote_fetcher.rb that is triggered when handling hostnames in SRV records. With a specially crafted response, a context-dependent attacker may conduct DNS hijacking attacks. This vulnerability is due to an incomplete fix for CVE-2015-3900, which allowed redirection to an arbitrary gem server in any security domain. cvss_v2: 5.0 patched_versions: - ~> 2.0.17 - ~> 2.2.5 - ">= 2.4.8"
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
bundler-audit-0.7.0.1 | data/ruby-advisory-db/gems/rubygems-update/CVE-2015-4020.yml |