CVE-2015-1828: HTTPS MitM vulnerability in http.rb

52 views
Skip to first unread message

Tony Arcieri

unread,
Mar 24, 2015, 10:51:46 PM3/24/15
to htt...@googlegroups.com, rubysec-...@googlegroups.com, moder...@osvdb.org
Affected versions: all
Fixed versions: 0.7.3

http.rb failed to call the OpenSSL::SSL::SSLSocket#post_connection_check method to perform hostname verification. Because of this, an attacker with a valid certificate but with a mismatched subject can perform a MitM attack.

The problem was corrected by calling #post_connection_check.

Additionally I have filed this ticket upstream with Ruby OpenSSL to make this API less confusing and error-prone:

Reply all
Reply to author
Forward
0 new messages