RubyGems before 1.8.23 can redirect HTTPS connections to HTTP, which makes it easier for remote attackers to observe or modify a gem during installation via a man-in-the-middle attack.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-1878 | RubyGems before 1.8.23 can redirect HTTPS connections to HTTP, which makes it easier for remote attackers to observe or modify a gem during installation via a man-in-the-middle attack. |
![]() |
GHSA-228f-g3h7-3fj3 | RubyGems HTTPS to HTTP redirect |
![]() |
USN-1582-1 | RubyGems vulnerabilities |
![]() |
USN-1583-1 | Ruby vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T19:26:08.518Z
Reserved: 2012-04-04T00:00:00
Link: CVE-2012-2125

No data.

Status : Deferred
Published: 2013-10-01T17:55:03.257
Modified: 2025-04-11T00:51:21.963
Link: CVE-2012-2125


No data.