Show plain JSON{"id": "CVE-2019-11027", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": true, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}]}, "published": "2019-06-10T19:29:00.607", "references": [{"url": "https://github.com/openid/ruby-openid/issues/122", "source": "cve@mitre.org"}, {"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00014.html", "source": "cve@mitre.org"}, {"url": "https://marc.info/?l=openid-security&m=155154717027534&w=2", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://security.gentoo.org/glsa/202003-09", "source": "cve@mitre.org"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "Ruby OpenID (aka ruby-openid) through 2.8.0 has a remotely exploitable flaw. This library is used by Rails web applications to integrate with OpenID Providers. Severity can range from medium to critical, depending on how a web application developer chose to employ the ruby-openid library. Developers who based their OpenID integration heavily on the \"example app\" provided by the project are at highest risk."}, {"lang": "es", "value": "Ruby OpenID (conocido como ruby-openid) a trav\u00e9s de la versi\u00f3n 2.8.0 tiene un defecto aprovechable remotamente. Esta librer\u00eda es usada para aplicaciones de Rails Web, para integrar con suministradores de OpenID. La gravedad puede ir desde media a cr\u00edtica, dependiendo de como los desarrolladores de aplicaciones Web eligieron para emplear la ruby-openid library. Los desarrolladores que basaron su integraci\u00f3n OpenID fuertemente en el ejemplo \"example app\" proporcionado por el proyecto est\u00e1n en alto riesgo."}], "lastModified": "2019-06-14T12:29:00.383", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:openid:ruby-openid:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7301C564-3712-4F9C-AD7E-80BDDB698B2B", "versionEndIncluding": "2.8.0"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}