rubygems <2.4.8 vulnerable to DNS request hijacking

2015.06.26
Credit: Reed Loden
Risk: Medium
Local: No
Remote: Yes
CWE: N/A

A bit old news, but I didn't see anybody post about this, so figured I'd pass it on so folks know to update. Haven't seen updates by the distros either. MITRE's summary (updated): """ RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.5, and 2.4.x before 2.4.8 does not validate the hostname when fetching gems or making API request, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack attack." """ References: * https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/ * http://blog.rubygems.org/2015/05/14/CVE-2015-3900.html * http://blog.rubygems.org/2015/06/08/2.4.8-released.html * http://blog.rubygems.org/2015/06/08/2.2.5-released.html * https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-007/?fid=6356 * https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-009/?fid=6478

References:

https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/
http://blog.rubygems.org/2015/05/14/CVE-2015-3900.html
http://blog.rubygems.org/2015/06/08/2.4.8-released.html
http://blog.rubygems.org/2015/06/08/2.2.5-released.html
https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-007/?fid=6356
https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-009/?fid=6478
http://seclists.org/oss-sec/2015/q2/807


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top