Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-fx2c-u8eb-dufe
Vulnerability ID VCID-fx2c-u8eb-dufe
Aliases CVE-2012-2125
GHSA-228f-g3h7-3fj3
OSV-85809
Summary HTTP Request Smuggling RubyGems can redirect HTTPS connections to HTTP, which makes it easier for remote attackers to observe or modify a gem during installation via a man-in-the-middle attack.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
generic_textual MODERATE http://rhn.redhat.com/errata/RHSA-2013-1203.html
generic_textual MODERATE http://rhn.redhat.com/errata/RHSA-2013-1441.html
generic_textual MODERATE http://rhn.redhat.com/errata/RHSA-2013-1852.html
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2012-2125
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2012-2125
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2012-2125
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2012-2125
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2012-2125
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2012-2125
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2012-2125
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2012-2125
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2012-2125
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2012-2125
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2012-2125
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2012-2125
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2012-2125
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2012-2125
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2012-2125
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2012-2125
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2012-2125
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2012-2125
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2012-2125
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2012-2125
epss 0.00638 https://api.first.org/data/v1/epss?cve=CVE-2012-2125
generic_textual MODERATE https://bugzilla.redhat.com/show_bug.cgi?id=814718
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-228f-g3h7-3fj3
generic_textual MODERATE https://github.com/rubygems/rubygems
generic_textual MODERATE https://github.com/rubygems/rubygems/blob/1.8/History.txt
generic_textual MODERATE https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2012-2125.yml
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2012-2125
generic_textual MODERATE http://www.openwall.com/lists/oss-security/2012/04/20/24
generic_textual MODERATE http://www.ubuntu.com/usn/USN-1582-1
No exploits are available.
Exploit Prediction Scoring System (EPSS)
Percentile 0.70439
EPSS Score 0.00638
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:46:50.394311+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rubygems-update/CVE-2012-2125.yml 38.0.0