CVE-2012-2125Rubygems vulnerability

12 documents7 sources
Severity
5.8MEDIUMNVD
EPSS
0.6%
top 29.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 1
Latest updateMay 17

Description

RubyGems before 1.8.23 can redirect HTTPS connections to HTTP, which makes it easier for remote attackers to observe or modify a gem during installation via a man-in-the-middle attack.

CVSS vector

AV:N/AC:M/C:P/I:P/A:NExploitability: 8.6 | Impact: 4.9

Affected Packages3 packages

debiandebian/rubygems< rubygems 1.8.24-1 (bookworm)
Debianrubygems/rubygems< 1.8.24-1+3
NVDrubygems/rubygems1.8.22+22

Patches

🔴Vulnerability Details

3
GHSA
RubyGems HTTPS to HTTP redirect2022-05-17
OSV
RubyGems HTTPS to HTTP redirect2022-05-17
OSV
CVE-2012-2125: RubyGems before 12013-10-01

📋Vendor Advisories

4
Ubuntu
RubyGems vulnerabilities2012-09-26
Ubuntu
Ruby vulnerabilities2012-09-26
Red Hat
rubygems: Two security fixes in v1.8.232012-04-19
Debian
CVE-2012-2125: rubygems - RubyGems before 1.8.23 can redirect HTTPS connections to HTTP, which makes it ea...2012

💬Community

4
Bugzilla
CVE-2012-2125, CVE-2012-2126 rubygems: Two security fixes in v1.8.23 [epel-5]2012-04-20
Bugzilla
CVE-2012-2125 CVE-2012-2126 rubygems: Two security fixes in v1.8.232012-04-20
Bugzilla
CVE-2012-2125, CVE-2012-2126 rubygems: Two security fixes in v1.8.23 [fedora-16]2012-04-20
Bugzilla
CVE-2012-2125, CVE-2012-2126 rubygems: Two security fixes in v1.8.23 [fedora-all]2012-04-20