Rubygems.org is the Ruby community's gem hosting service. Rubygems.org users with MFA enabled would normally be protected from account takeover in the case of email account takeover. However, a workaround on the forgotten password form allows an attacker to bypass the MFA requirement and takeover the account. This vulnerability has been patched in commit 0b3272a.
References
Configurations
History
21 Nov 2024, 08:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/rubygems/rubygems.org/commit/0b3272ac17b45748ee0d1867c49867c7deb26565 - Patch | |
References | () https://github.com/rubygems/rubygems.org/security/advisories/GHSA-4v23-vj8h-7jp2 - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.8 |
24 Oct 2024, 16:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-306 |
22 Jan 2024, 19:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/rubygems/rubygems.org/security/advisories/GHSA-4v23-vj8h-7jp2 - Patch, Vendor Advisory | |
References | () https://github.com/rubygems/rubygems.org/commit/0b3272ac17b45748ee0d1867c49867c7deb26565 - Patch | |
First Time |
Rubygems rubygems.org
Rubygems |
|
CPE | cpe:2.3:a:rubygems:rubygems.org:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
12 Jan 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-12 21:15
Updated : 2024-11-21 08:54
NVD link : CVE-2024-21654
Mitre link : CVE-2024-21654
CVE.ORG link : CVE-2024-21654
JSON object : View
Products Affected
rubygems
- rubygems.org