{"id":"CVE-2012-2125","details":"RubyGems before 1.8.23 can redirect HTTPS connections to HTTP, which makes it easier for remote attackers to observe or modify a gem during installation via a man-in-the-middle attack.","aliases":["GHSA-228f-g3h7-3fj3"],"modified":"2025-08-09T19:01:28Z","published":"2013-10-01T17:55:03Z","references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2013-1203.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2013-1441.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2013-1852.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/55381"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-1582-1/"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2012/04/20/24"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=814718"},{"type":"WEB","url":"https://github.com/rubygems/rubygems/blob/1.8/History.txt"}],"schema_version":"1.7.3"}