Lucene search

K
rubygemsRubySecRUBY:EM-HTTP-REQUEST-2020-13482
HistoryMay 23, 2021 - 9:00 p.m.

Improper Certificate Validation in EM-HTTP-Request

2021-05-2321:00:00
RubySec
github.com
8
eventmachine
man-in-the-middle attack
tls server certificate

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

EM-HTTP-Request 1.1.5 uses the library eventmachine in an insecure way
that allows an attacker to perform a man-in-the-middle attack against users of the
library. The hostname in a TLS server certificate is not verified.

Affected configurations

Vulners
Node
rubyem-http-requestRange1.1.6
VendorProductVersionCPE
rubyem-http-request*cpe:2.3:a:ruby:em-http-request:*:*:*:*:*:*:*:*

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N