The Case for 2FA, Post Rest-client Gem CVE
22-Aug-2019 2028
Most CVEs occur as a result of a oversight in the architecture or mishandling of how libraries may interact with your application. In some cases like what had occurred with the Rest-client gem version 1.6.13, a package maintainer account on https://rubygems.org was hijacked and used to push malicious code that would compromise sensitive credentials for payment manager accounts, database access, repository access, and others that can cause irreparable damages. The hijacker conducted a series of releases – 1.6.10, 1.6.11, 1.6.12, and 1.6.13 – all of which contained malicious code. This attack was also more elusive in that it was affecting a point release from a older version. This strategy could have been for a target using a version within 1.6.10-.
The Case for 2FA, Post Rest-client Gem CVE #ruby #rubydeveloper #rubyonrails #Rest-client #gem #rest-client https://rubyonrails.ba/link/the-case-for-2fa-post-rest-client-gem-cve