5.8

CVE-2012-2125

RubyGems before 1.8.23 can redirect HTTPS connections to HTTP, which makes it easier for remote attackers to observe or modify a gem during installation via a man-in-the-middle attack.

Data is provided by the National Vulnerability Database (NVD)
RubygemsRubygems Version <= 1.8.22
   RedhatOpenshift Version1.2.2 Update- Editionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.0
   RedhatOpenshift Version1.2.2 Update- Editionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.1
   RedhatOpenshift Version1.2.2 Update- Editionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.2
   RedhatOpenshift Version1.2.2 Update- Editionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.3
   RedhatOpenshift Version1.2.2 Update- Editionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.4
   RedhatOpenshift Version1.2.2 Update- Editionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.5
   RedhatOpenshift Version1.2.2 Update- Editionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.6
   RedhatOpenshift Version1.2.2 Update- Editionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.7
   RedhatOpenshift Version1.2.2 Update- Editionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.8
   RedhatOpenshift Version1.2.2 Update- Editionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.9
   RedhatOpenshift Version1.2.2 Update- Editionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.10
   RedhatOpenshift Version1.2.2 Update- Editionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.11
   RedhatOpenshift Version1.2.2 Update- Editionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.12
   RedhatOpenshift Version1.2.2 Update- Editionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.13
   RedhatOpenshift Version1.2.2 Update- Editionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.14
   RedhatOpenshift Version1.2.2 Update- Editionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.15
   RedhatOpenshift Version1.2.2 Update- Editionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.16
   RedhatOpenshift Version1.2.2 Update- Editionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.17
   RedhatOpenshift Version1.2.2 Update- Editionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.18
   RedhatOpenshift Version1.2.2 Update- Editionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.19
   RedhatOpenshift Version1.2.2 Update- Editionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.20
   RedhatOpenshift Version1.2.2 Update- Editionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
RubygemsRubygems Version1.8.21
   RedhatOpenshift Version1.2.2 Update- Editionenterprise
   CanonicalUbuntu Linux Version12.04 Update- Editionlts
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.64% 0.68
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5.8 8.6 4.9
AV:N/AC:M/Au:N/C:P/I:P/A:N