Vulnerability Name:
CVE-2014-0036 (CCN-91758)
Assigned:
2013-12-03
Published:
2014-03-06
Updated:
2014-04-18
Summary:
The rbovirt gem before 0.0.24 for Ruby uses the rest-client gem with SSL verification disabled, which allows remote attackers to conduct man-in-the-middle attacks via unspecified vectors.
CVSS v3 Severity:
5.3 Medium
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Low
Availibility (A):
None
CVSS v2 Severity:
6.8 Medium
(CVSS v2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
)
5.0 Medium
(Temporal CVSS v2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Medium
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
Partial
Availibility (A):
Partial
4.3 Medium
(CCN CVSS v2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
)
3.2 Low
(CCN Temporal CVSS v2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Medium
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Partial
Availibility (A):
None
Vulnerability Type:
CWE-310
Vulnerability Consequences:
Gain Access
References:
Source: MITRE
Type: CNA
CVE-2014-0036
Source: FEDORA
Type: UNKNOWN
FEDORA-2014-3573
Source: FEDORA
Type: UNKNOWN
FEDORA-2014-3526
Source: CCN
Type: RubyGems Web site
rbovirt Gem for Ruby
Source: MLIST
Type: UNKNOWN
[oss-security] 20140306 CVE-2014-0036 rubygem-rbovirt: unsafe use of rest-client
Source: CCN
Type: BID-66006
Rbovirt Ruby Gem Man in the Middle Vulnerability
Source: CCN
Type: Red Hat Bugzilla Bug 1058595
CVE-2014-0036 rubygem-rbovirt: unsafe use of rest-client
Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=1058595
Source: XF
Type: UNKNOWN
rbovirt-ruby-cve20140036-spoofing(91758)
Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2014-0036
Vulnerable Configuration:
Configuration 1
:
cpe:/a:amos_benari:rbovirt:0.0.1:*:*:*:*:ruby:*:*
OR
cpe:/a:amos_benari:rbovirt:0.0.2:*:*:*:*:ruby:*:*
OR
cpe:/a:amos_benari:rbovirt:0.0.3:*:*:*:*:ruby:*:*
OR
cpe:/a:amos_benari:rbovirt:0.0.4:*:*:*:*:ruby:*:*
OR
cpe:/a:amos_benari:rbovirt:0.0.5:*:*:*:*:ruby:*:*
OR
cpe:/a:amos_benari:rbovirt:0.0.6:*:*:*:*:ruby:*:*
OR
cpe:/a:amos_benari:rbovirt:0.0.7:*:*:*:*:ruby:*:*
OR
cpe:/a:amos_benari:rbovirt:0.0.8:*:*:*:*:ruby:*:*
OR
cpe:/a:amos_benari:rbovirt:0.0.9:*:*:*:*:ruby:*:*
OR
cpe:/a:amos_benari:rbovirt:0.0.10:*:*:*:*:ruby:*:*
OR
cpe:/a:amos_benari:rbovirt:0.0.11:*:*:*:*:ruby:*:*
OR
cpe:/a:amos_benari:rbovirt:0.0.12:*:*:*:*:ruby:*:*
OR
cpe:/a:amos_benari:rbovirt:0.0.13:*:*:*:*:ruby:*:*
OR
cpe:/a:amos_benari:rbovirt:0.0.14:*:*:*:*:ruby:*:*
OR
cpe:/a:amos_benari:rbovirt:0.0.15:*:*:*:*:ruby:*:*
OR
cpe:/a:amos_benari:rbovirt:0.0.16:*:*:*:*:ruby:*:*
OR
cpe:/a:amos_benari:rbovirt:0.0.17:*:*:*:*:ruby:*:*
OR
cpe:/a:amos_benari:rbovirt:0.0.18:*:*:*:*:ruby:*:*
OR
cpe:/a:amos_benari:rbovirt:0.0.19:*:*:*:*:ruby:*:*
OR
cpe:/a:amos_benari:rbovirt:0.0.20:*:*:*:*:ruby:*:*
OR
cpe:/a:amos_benari:rbovirt:0.0.21:*:*:*:*:ruby:*:*
OR
cpe:/a:amos_benari:rbovirt:0.0.22:*:*:*:*:ruby:*:*
OR
cpe:/a:amos_benari:rbovirt:*:*:*:*:*:ruby:*:*
(Version <= 0.0.23)
Denotes that component is vulnerable
BACK
amos_benari
rbovirt 0.0.1
amos_benari
rbovirt 0.0.2
amos_benari
rbovirt 0.0.3
amos_benari
rbovirt 0.0.4
amos_benari
rbovirt 0.0.5
amos_benari
rbovirt 0.0.6
amos_benari
rbovirt 0.0.7
amos_benari
rbovirt 0.0.8
amos_benari
rbovirt 0.0.9
amos_benari
rbovirt 0.0.10
amos_benari
rbovirt 0.0.11
amos_benari
rbovirt 0.0.12
amos_benari
rbovirt 0.0.13
amos_benari
rbovirt 0.0.14
amos_benari
rbovirt 0.0.15
amos_benari
rbovirt 0.0.16
amos_benari
rbovirt 0.0.17
amos_benari
rbovirt 0.0.18
amos_benari
rbovirt 0.0.19
amos_benari
rbovirt 0.0.20
amos_benari
rbovirt 0.0.21
amos_benari
rbovirt 0.0.22
amos_benari
rbovirt *