CVE-2012-2125

RubyGems before 1.8.23 can redirect HTTPS connections to HTTP, which makes it easier for remote attackers to observe or modify a gem during installation via a man-in-the-middle attack.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:rubygems:rubygems:*:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:1.8.4:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:1.8.5:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:1.8.6:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:1.8.7:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:1.8.8:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:1.8.9:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:1.8.10:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:1.8.11:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:1.8.12:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:1.8.13:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:1.8.14:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:1.8.15:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:1.8.16:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:1.8.17:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:1.8.18:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:1.8.19:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:1.8.20:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:1.8.21:*:*:*:*:*:*:*
OR cpe:2.3:a:redhat:openshift:1.2.2:-:enterprise:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*

History

No history.

Information

Published : 2013-10-01 17:55

Updated : 2023-12-10 11:16


NVD link : CVE-2012-2125

Mitre link : CVE-2012-2125

CVE.ORG link : CVE-2012-2125


JSON object : View

Products Affected

redhat

  • openshift

canonical

  • ubuntu_linux

rubygems

  • rubygems