John Downey

2 exploits Active since Nov 2017
CVE-2017-0904 WRITEUP HIGH WRITEUP
Private_address_check <0.4.0 - SSRF
The private_address_check ruby gem before 0.4.0 is vulnerable to a bypass due to use of Ruby's Resolv.getaddresses method, which is OS-dependent and should not be relied upon for security measures, such as when used to blacklist private network addresses to prevent server-side request forgery.
CVSS 8.1
CVE-2018-3759 WRITEUP LOW WRITEUP
Private Address Check < 0.5.0 - Race Condition
private_address_check ruby gem before 0.5.0 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to the address the socket uses not being checked. DNS entries with a TTL of 0 can trigger this case where the initial resolution is a public address but the subsequent resolution is a private address.
CVSS 3.7