Description
The connect method in lib/net/http.rb in the (1) Net::HTTP and (2) Net::HTTPS libraries in Ruby 1.8.5 and 1.8.6 does not verify that the commonName (CN) field in a server certificate matches the domain name in an HTTPS request, which makes it easier for remote attackers to intercept SSL transmissions via a man-in-the-middle attack or spoofed web site.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1410-1 | New ruby1.8 packages fix insecure SSL certificate validation |
Debian DSA |
DSA-1411-1 | New libopenssl-ruby packages fix insecure SSL certificate validation |
Debian DSA |
DSA-1412-1 | New ruby1.9 packages fix insecure SSL certificate validation |
EUVD |
EUVD-2007-5143 | The connect method in lib/net/http.rb in the (1) Net::HTTP and (2) Net::HTTPS libraries in Ruby 1.8.5 and 1.8.6 does not verify that the commonName (CN) field in a server certificate matches the domain name in an HTTPS request, which makes it easier for remote attackers to intercept SSL transmissions via a man-in-the-middle attack or spoofed web site. |
Ubuntu USN |
USN-596-1 | Ruby vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T15:24:41.704Z
Reserved: 2007-09-30T00:00:00.000Z
Link: CVE-2007-5162
No data.
Status : Modified
Published: 2007-10-01T05:17:00.000
Modified: 2026-04-23T00:35:47.467
Link: CVE-2007-5162
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN