The Ruby http gem before 0.7.3 does not verify hostnames in SSL connections, which might allow remote attackers to obtain sensitive information via a man-in-the-middle-attack.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://rubysec.com/advisories/http-CVE-2015-1828 | third party advisory |
https://github.com/ruby/openssl/issues/8 | issue tracking third party advisory |
https://groups.google.com/forum/#%21topic/httprb/jkb4oxwZjkU |