CVE-2015-1855

Severity
5.9MEDIUM
EPSS
2.7%
top 14.07%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 29
Latest updateMay 24

Description

verify_certificate_identity in the OpenSSL extension in Ruby before 2.0.0 patchlevel 645, 2.1.x before 2.1.6, and 2.2.x before 2.2.2 does not properly validate hostnames, which allows remote attackers to spoof servers via vectors related to (1) multiple wildcards, (1) wildcards in IDNA names, (3) case sensitivity, and (4) non-ASCII characters.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 2.2 | Impact: 3.6

Affected Packages8 packages

NVDruby-lang/ruby2.1.02.1.6+2
NVDruby-lang/trunk< 50292
Ubunturuby2.0< 2.0.0.484-1ubuntu2.4
Ubunturuby2.3< 2.3.1-2~16.04.2
Ubunturuby1.9.1< 1.9.3.484-2ubuntu1.3

Also affects: Debian Linux 7.0, 8.0, 9.0

🔴Vulnerability Details

4
GHSA
GHSA-4x8v-74xf-h4g3: verify_certificate_identity in the OpenSSL extension in Ruby before 22022-05-24
CVEList
CVE-2015-1855: verify_certificate_identity in the OpenSSL extension in Ruby before 22019-11-29
OSV
ruby1.9.1, ruby2.0, ruby2.3 vulnerabilities2017-07-25
OSV
CVE-2015-1855: verify_certificate_identity in the OpenSSL extension in Ruby before 22015-04-09

📋Vendor Advisories

3
Ubuntu
Ruby vulnerabilities2017-07-25
Red Hat
ruby: OpenSSL extension hostname matching implementation violates RFC 61252015-03-30
Apple
CVE-2015-1855: OS X El Capitan v10.11

💬Community

2
Bugzilla
CVE-2015-1855 ruby: OpenSSL extension hostname matching implementation violates RFC 6125 [fedora-all]2015-04-08
Bugzilla
CVE-2015-1855 ruby: OpenSSL extension hostname matching implementation violates RFC 61252015-04-08