Bug 2364868 (CVE-2025-46551)

Summary: CVE-2025-46551 jruby-openssl: jruby: JRuby-OpenSSL has hostname verification disabled by default
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: adupliak, anstephe, anthomas, asoldano, ataylor, avibelli, bbaranow, bgeorges, bmaxwell, brian.stansberry, cdewolf, chfoley, clement.escoffier, cmiranda, dandread, darran.lofthouse, dhanak, dkreling, dosoudil, ecerquei, ehelms, fjuma, fmariani, ggainey, gmalinko, gsmet, ibek, istudens, ivassile, iweiss, janstey, jmartisk, jpoth, jrokos, jross, jscholz, juwatts, kverlaen, lgao, lthon, manderse, mhulan, mnovotny, mosmerov, msochure, msvehla, nmoumoul, nwallace, olubyans, osousa, pcongius, pcreech, pdelbell, pesilva, pgallagh, pjindal, pmackay, porcelli, probinso, rchan, rguimara, rkieley, rruss, rstancel, rstepani, rsvoboda, sausingh, sbiarozk, smaestri, smallamp, swoodman, tcunning, tom.jenkinson, tqvarnst, yfang
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A security issue was discovered in JRuby-OpenSSL gem for JRuby. When verifying SSL certificates, jruby-openssl does not confirm that the hostname presented in the certificate matches the hostname of the system in which it is attempting to connect. A man-in-the-middle can present a valid certificate for an attacker-controlled domain, which, in affected JRuby versions, may be accepted.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2364898, 2364899, 2364897    
Bug Blocks:    

Description OSIDB Bzimport 2025-05-07 17:01:08 UTC
JRuby-OpenSSL is an add-on gem for JRuby that emulates the Ruby OpenSSL native library. Starting in JRuby-OpenSSL version 0.12.1 and prior to version 0.15.4 (corresponding to JRuby versions starting in 9.3.4.0 prior to 9.4.12.1 and 10.0.0.0 prior to 10.0.0.1), when verifying SSL certificates, JRuby-OpenSSL does not verify that the hostname presented in the certificate matches the one the user tries to connect to. This means a man-in-the-middle could just present any valid cert for a completely different domain they own, and JRuby would accept the cert. Anybody using JRuby to make requests of external APIs, or scraping the web, that depends on https to connect securely. JRuby-OpenSSL version 0.15.4 contains a fix for the issue. This fix is included in JRuby versions 10.0.0.1 and 9.4.12.1.