cvelist/2015/3xxx/CVE-2015-3900.json

88 lines
2.6 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2015-3900",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a \"DNS hijack attack.\""
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "http://www.openwall.com/lists/oss-security/2015/06/26/2"
},
{
"url" : "https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-007/?fid=6356"
},
{
"url" : "https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/"
},
{
"url" : "http://blog.rubygems.org/2015/05/14/CVE-2015-3900.html"
},
{
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
},
{
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163502.html"
},
{
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163600.html"
},
{
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164236.html"
},
{
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1657.html"
},
{
"url" : "http://www.securityfocus.com/bid/75482"
}
]
}
}