CVE-2012-2125: HTTP Request Smuggling
(updated )
RubyGems can redirect HTTPS connections to HTTP, which makes it easier for remote attackers to observe or modify a gem during installation via a man-in-the-middle attack.
References
- rhn.redhat.com/errata/RHSA-2013-1203.html
- rhn.redhat.com/errata/RHSA-2013-1441.html
- rhn.redhat.com/errata/RHSA-2013-1852.html
- secunia.com/advisories/55381
- www.openwall.com/lists/oss-security/2012/04/20/24
- www.ubuntu.com/usn/USN-1582-1/
- bugzilla.redhat.com/show_bug.cgi?id=814718
- github.com/rubygems/rubygems/blob/1.8/History.txt
- nvd.nist.gov/vuln/detail/CVE-2012-2125
Detect and mitigate CVE-2012-2125 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →