Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXEyN2YtdjNyNi05djc3
Improper Certificate Validation in EM-HTTP-Request
EM-HTTP-Request 1.1.5 uses the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified.
Permalink: https://github.com/advisories/GHSA-q27f-v3r6-9v77JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXEyN2YtdjNyNi05djc3
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 2 years ago
Updated: about 1 month ago
CVSS Score: 7.4
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Identifiers: GHSA-q27f-v3r6-9v77, CVE-2020-13482
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-13482
- https://github.com/igrigorik/em-http-request/issues/339
- https://lists.fedoraproject.org/archives/list/[email protected]/message/MKYP5TR5NTVVDX5R4HCNNH2OQR7M4X3J/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/Z32PUJA6RGBZ3TKSOTGUXZ45662S3MVF/
- https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request
- https://github.com/igrigorik/em-http-request/commit/e5fa144f8d21050dd1fc15a4dc8aa34ac6f30602
- https://github.com/advisories/GHSA-q27f-v3r6-9v77
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/em-http-request/CVE-2020-13482.yml
Affected Packages
rubygems:em-http-request
Versions: <= 1.1.5Fixed in: 1.1.6