Man-in-the-Middle (MitM) Affecting em-http-request package, versions <1.1.6
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.09% (41st
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RUBY-EMHTTPREQUEST-570369
- published 26 May 2020
- disclosed 26 May 2020
- credit Unknown
Introduced: 26 May 2020
CVE-2020-13482 Open this link in a new tabHow to fix?
Upgrade em-http-request
to version 1.1.6 or higher.
Overview
em-http-request is an EventMachine based, async HTTP Request client.
Affected versions of this package are vulnerable to Man-in-the-Middle (MitM). The library eventmachine is being used in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified.
References
CVSS Scores
version 3.1