CVE-2012-5622 – openshift-console: CSRF attack
https://notcve.org/view.php?id=CVE-2012-5622
Cross-site request forgery (CSRF) vulnerability in the management console (openshift-console/app/controllers/application_controller.rb) in OpenShift 0.0.5 allows remote attackers to hijack the authentication of arbitrary users via unspecified vectors. Vulnerabilidad de falsificación de peticiones en sitios cruzados (CSRF) en la consola de gestión (openshift-console/app/controllers/application_controller.rb) en OpenShift v0.0.5 permite a atacantes remotos secuestrar la autenticación de usuarios arbitrarios a través de vectores no especificados. • http://osvdb.org/88333 http://rhn.redhat.com/errata/RHSA-2012-1555.html https://bugzilla.redhat.com/show_bug.cgi?id=883227 https://github.com/openshift/origin-server/commit/1ad0d1d792395306b59a34ad7b6e7e89a35d041e https://github.com/openshift/origin-server/pull/1009 https://access.redhat.com/security/cve/CVE-2012-5622 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2012-2126 – rubygems: Two security fixes in v1.8.23
https://notcve.org/view.php?id=CVE-2012-2126
RubyGems before 1.8.23 does not verify an SSL certificate, which allows remote attackers to modify a gem during installation via a man-in-the-middle attack. RubyGems anteriores a 1.8.23 no verifican un certificado SSL, lo cual permite a atacantes remotos modificar una gema durante la instalación a través de un ataque man-in-the-middle. • http://rhn.redhat.com/errata/RHSA-2013-1203.html http://rhn.redhat.com/errata/RHSA-2013-1441.html http://rhn.redhat.com/errata/RHSA-2013-1852.html http://secunia.com/advisories/55381 http://www.openwall.com/lists/oss-security/2012/04/20/24 http://www.ubuntu.com/usn/USN-1582-1 https://bugzilla.redhat.com/show_bug.cgi?id=814718 https://github.com/rubygems/rubygems/blob/1.8/History.txt https://access.redhat.com/security/cve/CVE-2012-2126 • CWE-310: Cryptographic Issues •
CVE-2012-2125 – rubygems: Two security fixes in v1.8.23
https://notcve.org/view.php?id=CVE-2012-2125
RubyGems before 1.8.23 can redirect HTTPS connections to HTTP, which makes it easier for remote attackers to observe or modify a gem during installation via a man-in-the-middle attack. RubyGems anteriores a 1.8.23 pueden redirigir conexiones HTTPS a HTTP, lo cual facilita a atacantes remotos observar o modificar una gema durante la instalación a través de un ataque man-in-the-middle. • http://rhn.redhat.com/errata/RHSA-2013-1203.html http://rhn.redhat.com/errata/RHSA-2013-1441.html http://rhn.redhat.com/errata/RHSA-2013-1852.html http://secunia.com/advisories/55381 http://www.openwall.com/lists/oss-security/2012/04/20/24 http://www.ubuntu.com/usn/USN-1582-1 https://bugzilla.redhat.com/show_bug.cgi?id=814718 https://github.com/rubygems/rubygems/blob/1.8/History.txt https://access.redhat.com/security/cve/CVE-2012-2125 •