EM-HTTP-Request 1.1.5 uses the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified.
github.com/advisories/GHSA-q27f-v3r6-9v77
github.com/igrigorik/em-http-request
github.com/igrigorik/em-http-request/commit/e5fa144f8d21050dd1fc15a4dc8aa34ac6f30602
github.com/igrigorik/em-http-request/issues/339
github.com/rubysec/ruby-advisory-db/blob/master/gems/em-http-request/CVE-2020-13482.yml
lists.fedoraproject.org/archives/list/[email protected]/message/MKYP5TR5NTVVDX5R4HCNNH2OQR7M4X3J
lists.fedoraproject.org/archives/list/[email protected]/message/Z32PUJA6RGBZ3TKSOTGUXZ45662S3MVF
nvd.nist.gov/vuln/detail/CVE-2020-13482
securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request