Man-in-the-Middle (MitM) Affecting thrift_client Open this link in a new tab package, versions <0.9.3


0.0
medium
  • Attack Complexity

    High

  • User Interaction

    Required

  • Confidentiality

    High

  • Integrity

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-RUBY-THRIFTCLIENT-20415

  • published

    1 Aug 2017

  • disclosed

    19 Mar 2014

  • credit

    Ryan Greenberg

Introduced: 19 Mar 2014

CWE-300 Open this link in a new tab

Overview

thrift_client is a Thrift client wrapper that encapsulates some common failover behavior.

Affected versions of the package are vulnerable to Man-in-the-middle (MitM) attacks due to attacks due to downloading gems over an insecure protocol. Without a secure connection, it is possible for an attacker to intercept this connection and alter the packages received. In serious cases, this may even lead to Remote Code Execution (RCE) on your host server. You can read more about Man-in-the-Middle (MitM) on our blog.

Remediation

Upgrade thrift_client to version 0.9.3 or higher.