RubyGems before 1.8.23 can redirect HTTPS connections to HTTP, which makes it easier for remote attackers to observe or modify a gem during installation via a man-in-the-middle attack.
Link | Tags |
---|---|
http://secunia.com/advisories/55381 | third party advisory |
http://www.ubuntu.com/usn/USN-1582-1/ | vendor advisory |
https://github.com/rubygems/rubygems/blob/1.8/History.txt | |
http://rhn.redhat.com/errata/RHSA-2013-1203.html | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=814718 | patch |
http://www.openwall.com/lists/oss-security/2012/04/20/24 | patch mailing list |
http://rhn.redhat.com/errata/RHSA-2013-1852.html | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2013-1441.html | vendor advisory |