First published: Tue Jan 28 2014(Updated: )
Michael Samuel of Amcom reported that the rbovirt rubygem makes unsafe usage of the rest-client gem. HTTPS requests are sent with SSL verification disabled which could make applications making use of rbovirt vulnerable to MITM attacks.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/rbovirt | <0.0.24 | 0.0.24 |
Ovirt | <=0.0.23 | |
Ovirt | =0.0.1 | |
Ovirt | =0.0.2 | |
Ovirt | =0.0.3 | |
Ovirt | =0.0.4 | |
Ovirt | =0.0.5 | |
Ovirt | =0.0.6 | |
Ovirt | =0.0.7 | |
Ovirt | =0.0.8 | |
Ovirt | =0.0.9 | |
Ovirt | =0.0.10 | |
Ovirt | =0.0.11 | |
Ovirt | =0.0.12 | |
Ovirt | =0.0.13 | |
Ovirt | =0.0.14 | |
Ovirt | =0.0.15 | |
Ovirt | =0.0.16 | |
Ovirt | =0.0.17 | |
Ovirt | =0.0.18 | |
Ovirt | =0.0.19 | |
Ovirt | =0.0.20 | |
Ovirt | =0.0.21 | |
Ovirt | =0.0.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0036 is considered a high severity vulnerability due to its potential to allow man-in-the-middle (MITM) attacks.
To fix CVE-2014-0036, upgrade the rbovirt rubygem to version 0.0.24 or later.
CVE-2014-0036 affects all versions of rbovirt prior to 0.0.24.
CVE-2014-0036 exploits the unsafe usage of the rest-client gem in the rbovirt gem.
CVE-2014-0036 could lead to exposure to man-in-the-middle attacks due to SSL verification being disabled for HTTPS requests.