First published: Fri Jan 12 2024(Updated: )
Rubygems.org is the Ruby community's gem hosting service. Rubygems.org users with MFA enabled would normally be protected from account takeover in the case of email account takeover. However, a workaround on the forgotten password form allows an attacker to bypass the MFA requirement and takeover the account. This vulnerability has been patched in commit 0b3272a.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
RubyGems | <2024-01-08 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21654 has a high severity rating due to the potential for account takeover despite MFA being enabled.
To fix CVE-2024-21654, it is recommended to update RubyGems to a version later than 2024-01-08.
Users of rubygems.org who have multi-factor authentication (MFA) enabled are affected by CVE-2024-21654.
CVE-2024-21654 is classified as a security vulnerability related to authentication bypass.
Yes, CVE-2024-21654 can potentially be exploited remotely through the forgotten password form on rubygems.org.