7.5
CVSSv2

CVE-2019-15224

Published: 19/08/2019 Updated: 29/08/2019
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The rest-client gem 1.6.10 up to and including 1.6.13 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. Versions <=1.6.9 and >=1.6.14 are unaffected.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rest-client project rest-client

Vendor Advisories

Impact: Moderate Public Date: 2019-08-19 CWE: CWE-94 Bugzilla: 1743940: CVE-2019-15224 rubygem-rest-cli ...

Recent Articles

No REST for the wicked: Ruby gem hacked to siphon passwords, secrets from web devs
The Register • Thomas Claburn in San Francisco • 20 Aug 2019

Developer account cracked due to credential reuse, source tampered with and released to hundreds of programmers Malicious code ousted from PureScript's npm installer – but who put it there in the first place?

An old version of a Ruby software package called rest-client that was modified and released about a week ago has been removed from the Ruby Gems repository – because it was found to be deliberately leaking victims' credentials to a remote server. Jussi Koljonen, a developer with Visma in Helsinki, Finland, discovered the hacked code in rest-client v1.6.13, and opened an issue to discuss the matter on the GitHub repo for the software. The gem, originally intended to help Ruby developers send RE...