First published: Mon Oct 01 2007(Updated: )
Common Vulnerabilities and Exposures assigned an identifier <a href="https://access.redhat.com/security/cve/CVE-2007-5162">CVE-2007-5162</a> to the following vulnerability: The connect method in lib/net/http.rb in the (1) Net::HTTP and (2) Net::HTTPS libraries in Ruby 1.8.5 and 1.8.6 does not verify that the commonName (CN) field in a server certificate matches the domain name in an HTTPS request, which makes it easier for remote attackers to intercept SSL transmissions via a man-in-the-middle attack or spoofed web site. References: <a href="http://www.isecpartners.com/advisories/2007-006-rubyssl.txt">http://www.isecpartners.com/advisories/2007-006-rubyssl.txt</a> <a href="http://www.securityfocus.com/bid/25847">http://www.securityfocus.com/bid/25847</a> <a href="http://www.securityfocus.com/archive/1/480987">http://www.securityfocus.com/archive/1/480987</a> Patch applied to trunk: <a href="http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=13499">http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=13499</a> (original advisory links to other commits in other svn branches)
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby | >=1.8.5<=1.8.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-313691 is considered critical due to the potential for man-in-the-middle attacks.
To fix REDHAT-BUG-313691, it is recommended to upgrade to Ruby version 1.8.7 or later.
Ruby versions 1.8.5 and 1.8.6 are affected by REDHAT-BUG-313691.
The vulnerability in REDHAT-BUG-313691 exists due to the connect method not verifying the SSL certificates properly.
While upgrading is the best solution, a temporary workaround involves manually verifying SSL certificates during the connection process.