Search for vulnerabilities
Vulnerability details: VCID-zp1b-4nku-y7ht
Vulnerability ID VCID-zp1b-4nku-y7ht
Aliases CVE-2015-4020
GHSA-qv62-xfj6-32xm
Summary RubyGems Improper Input Validation vulnerability RubyGems 2.0.x before 2.0.17, 2.2.x before 2.2.5, and 2.3.x before 2.4.8 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record with a domain that is suffixed with the original domain name, aka a "DNS hijack attack." NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3900.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
generic_textual MODERATE http://blog.rubygems.org/2015/06/08/2.2.5-released.html
generic_textual MODERATE http://blog.rubygems.org/2015/06/08/2.4.8-released.html
epss 0.00524 https://api.first.org/data/v1/epss?cve=CVE-2015-4020
epss 0.00524 https://api.first.org/data/v1/epss?cve=CVE-2015-4020
epss 0.00524 https://api.first.org/data/v1/epss?cve=CVE-2015-4020
epss 0.00524 https://api.first.org/data/v1/epss?cve=CVE-2015-4020
epss 0.00524 https://api.first.org/data/v1/epss?cve=CVE-2015-4020
epss 0.00524 https://api.first.org/data/v1/epss?cve=CVE-2015-4020
epss 0.00524 https://api.first.org/data/v1/epss?cve=CVE-2015-4020
epss 0.00524 https://api.first.org/data/v1/epss?cve=CVE-2015-4020
epss 0.00524 https://api.first.org/data/v1/epss?cve=CVE-2015-4020
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-qv62-xfj6-32xm
generic_textual MODERATE https://github.com/rubygems/rubygems
generic_textual MODERATE https://github.com/rubygems/rubygems/commit/5c7bfb5
generic_textual MODERATE https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2015-4020.yml
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2015-4020
generic_textual MODERATE https://puppet.com/security/cve/CVE-2015-3900
generic_textual MODERATE https://web.archive.org/web/20200228084212/http://www.securityfocus.com/bid/75431
generic_textual MODERATE https://web.archive.org/web/20200228085830/https://puppet.com/security/cve/CVE-2015-3900
generic_textual MODERATE https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-009/?fid=6478
generic_textual MODERATE https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900
generic_textual MODERATE http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
generic_textual MODERATE http://www.securityfocus.com/bid/75431
No exploits are available.
Exploit Prediction Scoring System (EPSS)
Percentile 0.65956
EPSS Score 0.00524
Published At June 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-01T12:26:55.115065+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-qv62-xfj6-32xm/GHSA-qv62-xfj6-32xm.json 36.1.3