383
VMScore

CVE-2015-1855

Published: 29/11/2019 Updated: 30/09/2020
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

verify_certificate_identity in the OpenSSL extension in Ruby prior to 2.0.0 patchlevel 645, 2.1.x prior to 2.1.6, and 2.2.x prior to 2.2.2 does not properly validate hostnames, which allows remote malicious users to spoof servers via vectors related to (1) multiple wildcards, (1) wildcards in IDNA names, (3) case sensitivity, and (4) non-ASCII characters.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ruby-lang ruby 2.0.0

ruby-lang ruby

ruby-lang trunk

debian debian linux 7.0

debian debian linux 8.0

debian debian linux 9.0

puppet puppet agent 1.0.0

puppet puppet enterprise

Vendor Advisories

Several security issues were fixed in Ruby ...
It was discovered that the Ruby OpenSSL extension, part of the interpreter for the Ruby language, did not properly implement hostname matching, in violation of RFC 6125 This could allow remote attackers to perform a man-in-the-middle attack via crafted SSL certificates For the stable distribution (jessie), this problem has been fixed in version 2 ...
It was discovered that the Ruby OpenSSL extension, part of the interpreter for the Ruby language, did not properly implement hostname matching, in violation of RFC 6125 This could allow remote attackers to perform a man-in-the-middle attack via crafted SSL certificates For the oldstable distribution (wheezy), this problem has been fixed in versio ...
It was discovered that the Ruby OpenSSL extension, part of the interpreter for the Ruby language, did not properly implement hostname matching, in violation of RFC 6125 This could allow remote attackers to perform a man-in-the-middle attack via crafted SSL certificates For the oldstable distribution (wheezy), this problem has been fixed in versio ...
Impact: Moderate Public Date: 2015-03-30 CWE: CWE-297 Bugzilla: 1209981: CVE-2015-1855 ruby: OpenSSL ex ...
As discussed in <a href="wwwruby-langorg/en/news/2015/04/13/ruby-openssl-hostname-matching-vulnerability/">an upstream announcement</a>, Ruby's OpenSSL extension suffers a vulnerability through overly permissive matching of hostnames, which can lead to similar bugs such as CVE-2014-1492 ...
As discussed in <a href="wwwruby-langorg/en/news/2015/04/13/ruby-openssl-hostname-matching-vulnerability/">an upstream announcement</a>, Ruby's OpenSSL extension suffers a vulnerability through overly permissive matching of hostnames, which can lead to similar bugs such as CVE-2014-1492 ...
As discussed in <a href="wwwruby-langorg/en/news/2015/04/13/ruby-openssl-hostname-matching-vulnerability/">an upstream announcement</a>, Ruby's OpenSSL extension suffers a vulnerability through overly permissive matching of hostnames, which can lead to similar bugs such as CVE-2014-1492 ...
As discussed in <a href="wwwruby-langorg/en/news/2015/04/13/ruby-openssl-hostname-matching-vulnerability/">an upstream announcement</a>, Ruby's OpenSSL extension suffers a vulnerability through overly permissive matching of hostnames, which can lead to similar bugs such as CVE-2014-1492 ...
As discussed in <a href="wwwruby-langorg/en/news/2015/04/13/ruby-openssl-hostname-matching-vulnerability/">an upstream announcement</a>, Ruby's OpenSSL extension suffers a vulnerability through overly permissive matching of hostnames, which can lead to similar bugs such as CVE-2014-1492 ...

Github Repositories

poc for CVE-2015-1855

reproducer for CVE-2015-1855 how to reproduce it: create the necessary infra-structure $ bash 1sh set the vulnerable ruby (my system ruby is vulnerable) $ rvm use system $ ruby -v 1rb $ ruby 212p95 (2014-05-08 revision 45877) [x86_64-linux-gnu] true # true means vulnerable set the fixed ruby $