CVE-2025-46551
ADVISORY - githubSummary
Summary
When verifying SSL certificates, jruby-openssl is not verifying that the hostname presented in the certificate matches the one we are trying to connect to, meaning a MITM could just present any valid cert for a completely different domain they own, and JRuby wouldn't complain.
Details
n/a
PoC
An example domain bad.substitutealert.com was created to present the a certificate for the domain s8a.me. The following script run in IRB in CRuby 3.4.3 will fail with certificate verify failed (hostname mismatch), but will work just fine in JRuby 10.0.0.0 and JRuby 9.4.2.0, both of which use jruby-openssl version 0.15.3
require "net/http"
require "openssl"
uri = URI("https://bad.substitutealert.com/")
https = Net::HTTP.new(uri.host, uri.port)
https.use_ssl = true
https.verify_mode = OpenSSL::SSL::VERIFY_PEER
body = https.start { https.get(uri.request_uri).body }
puts body
Impact
Anybody using JRuby to make requests of external APIs, or scraping the web, that depends on https to connect securely
Common Weakness Enumeration (CWE)
Improper Certificate Validation
Improper Certificate Validation
NIST
2.2
CVSS SCORE
5.7mediumGitHub
CVSS SCORE
5.7mediumAlpine
-
Ubuntu
2.2
CVSS SCORE
3.7mediumRed Hat
2.8
CVSS SCORE
6.5mediumChainguard
CGA-x257-hx64-pmf4
-
minimos
MINI-775v-qpmr-4f92
-
minimos
MINI-9mh2-2r3m-m99q
-
minimos
MINI-mg84-gfww-c4fc
-
minimos
MINI-ph42-7rvj-qv2q
-
minimos
MINI-vqvj-prg7-mj3x
-