CVE-2020-13482
rubygem-em-http-request: missing SSL hostname validation allows MITM
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
EM-HTTP-Request 1.1.5 uses the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified.
EM-HTTP-Request versiĆ³n 1.1.5, usa la biblioteca eventmachine en una manera no segura que permite a un atacante llevar a cabo un ataque de tipo man-in-the-middle contra los usuarios de la biblioteca. El nombre de host en un certificado de servidor TLS no es verificado.
A flaw was found in rubygem-em-http-request. The eventmachine library does not verify the hostname in a TLS server certificate which can allow an attacker to perform a man-in-the-middle attack. The highest threat from this vulnerability is to data confidentiality and integrity.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-05-25 CVE Reserved
- 2020-05-25 CVE Published
- 2024-02-10 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-295: Improper Certificate Validation
- CWE-297: Improper Validation of Certificate with Host Mismatch
CAPEC
References (6)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/igrigorik/em-http-request/issues/339 | 2024-08-04 | |
https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request | 2024-08-04 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Em-http-request Project Search vendor "Em-http-request Project" | Em-http-request Search vendor "Em-http-request Project" for product "Em-http-request" | 1.1.5 Search vendor "Em-http-request Project" for product "Em-http-request" and version "1.1.5" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 32 Search vendor "Fedoraproject" for product "Fedora" and version "32" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 33 Search vendor "Fedoraproject" for product "Fedora" and version "33" | - |
Affected
|