Vulnerability Description
The rest-client gem 1.6.10 through 1.6.13 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. Versions <=1.6.9 and >=1.6.14 are unaffected.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rest-Client Project | Rest-Client | >= 1.6.10, <= 1.6.13 |
Related Weaknesses (CWE)
References
- https://github.com/rest-client/rest-client/issues/713Issue TrackingThird Party Advisory
- https://rubygems.org/gems/rest-client/versions/Product
- https://github.com/rest-client/rest-client/issues/713Issue TrackingThird Party Advisory
- https://rubygems.org/gems/rest-client/versions/Product
FAQ
What is CVE-2019-15224?
CVE-2019-15224 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The rest-client gem 1.6.10 through 1.6.13 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. Versions <=1.6.9 and >=1.6.14 are unaffected.
How severe is CVE-2019-15224?
CVE-2019-15224 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-15224?
Check the references section above for vendor advisories and patch information. Affected products include: Rest-Client Project Rest-Client.