CWE
295 297
EPSS
0.023%
Advisory Published
Advisory Published
Updated

CVE-2025-46551: JRuby-OpenSSL has hostname verification disabled by default

First published: Wed May 07 2025(Updated: )

### Summary When verifying SSL certificates, jruby-openssl is not verifying that the hostname presented in the certificate matches the one we are trying to connect to, meaning a MITM could just present _any_ valid cert for a completely different domain they own, and JRuby wouldn't complain. ### Details n/a ### PoC An example domain bad.substitutealert.com was created to present the a certificate for the domain s8a.me. The following script run in IRB in CRuby 3.4.3 will fail with `certificate verify failed (hostname mismatch)`, but will work just fine in JRuby 10.0.0.0 and JRuby 9.4.2.0, both of which use jruby-openssl version 0.15.3 ```ruby require "net/http" require "openssl" uri = URI("https://bad.substitutealert.com/") https = Net::HTTP.new(uri.host, uri.port) https.use_ssl = true https.verify_mode = OpenSSL::SSL::VERIFY_PEER body = https.start { https.get(uri.request_uri).body } puts body ``` ### Impact Anybody using JRuby to make requests of external APIs, or scraping the web, that depends on https to connect securely

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
OpenSSL>=0.12.1<0.15.4
Ruby>9.3.4.0<9.4.12.1>10.0.0.0<10.0.0.1
maven/org.jruby:jruby>=9.3.4.0<9.4.12.1
9.4.12.1
maven/org.jruby:jruby>=10.0.0.0<10.0.0.1
10.0.0.1
maven/rubygems:jruby-openssl>=0.12.1<0.15.4
0.15.4

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2025-46551?

    CVE-2025-46551 has been identified with a high severity due to its potential impact on SSL certificate verification.

  • How do I fix CVE-2025-46551?

    To mitigate CVE-2025-46551, upgrade JRuby-OpenSSL to version 0.15.4 or later.

  • Which versions of JRuby-OpenSSL are affected by CVE-2025-46551?

    CVE-2025-46551 affects JRuby-OpenSSL versions from 0.12.1 up to, but not including, 0.15.4.

  • Is there a workaround for CVE-2025-46551 if I cannot update immediately?

    If unable to update, consider disabling the use of JRuby-OpenSSL until a safe upgrade can be performed.

  • What are the implications of CVE-2025-46551 for my application?

    CVE-2025-46551 may allow attackers to bypass SSL certificate validation, exposing your application to man-in-the-middle attacks.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203