CVE-2019-15224
Description
The rest-client gem 1.6.10 through 1.6.13 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. Versions <=1.6.9 and >=1.6.14 are unaffected.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A code-execution backdoor was inserted by a third party into rest-client gem versions 1.6.10–1.6.13 on RubyGems.org.
Vulnerability
Overview The rest-client gem versions 1.6.10 through 1.6.13, distributed on RubyGems.org, contained a malicious backdoor that allowed remote code execution. The backdoor was inserted by an attacker who compromised a maintainer's RubyGems.org account and published the tainted versions [1][2]. Versions ≤1.6.9 and ≥1.6.14 are unaffected [1].
Exploitation
In Rails applications where Rails.env starts with "p" (such as "production"), the malicious code would execute and download a payload from a Pastebin.com URL, then run it on the server [2]. The payload reportedly communicated with a command-and-control server at mironanoru.zzz.com.ua [2]. Only users who explicitly pinned to the 1.6.x series and updated to the backdoored versions in the week before discovery were at risk; the 1.6.x line was superseded by 1.7.0 in 2014 [2].
Impact
An attacker could achieve arbitrary code execution on the affected system, leading to full compromise. The observed payload was used for cryptocurrency mining, but the backdoor could have been leveraged for any purpose, including data theft or further malware deployment [2].
Mitigation
The RubyGems security team yanked the malicious gem versions and locked the compromised maintainer account on August 19, 2019 [2][4]. The rest-client maintainers released version 1.6.14, identical to the clean 1.6.9, to supersede the affected versions [2]. Users should update to 1.6.14 or later, or downgrade to ≤1.6.9. Affected versions can be detected with grep --include='Gemfile.lock' -r . -e 'rest-client (1.6.1[0123])' [2].
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
rest-clientRubyGems | >= 1.6.10, < 1.7.0 | 1.7.0 |
cron_parserRubyGems | >= 1.0.13, <= 1.0.14 | — |
coin_baseRubyGems | >= 0 | — |
blockchain_walletRubyGems | >= 0 | — |
awesome-botRubyGems | >= 0 | — |
doge-coinRubyGems | >= 0 | — |
capistrano-colorsRubyGems | >= 0 | — |
bitcoin_vanityRubyGems | >= 0 | — |
coming-soonRubyGems | >= 0 | — |
omniauth_amazonRubyGems | >= 0 | — |
Affected products
11- Ruby/rest-clientdescription
- ghsa-coords10 versionspkg:gem/awesome-botpkg:gem/bitcoin_vanitypkg:gem/blockchain_walletpkg:gem/capistrano-colorspkg:gem/coin_basepkg:gem/coming-soonpkg:gem/cron_parserpkg:gem/doge-coinpkg:gem/omniauth_amazonpkg:gem/rest-client
>= 0+ 9 more
- (no CPE)range: >= 0
- (no CPE)range: >= 0
- (no CPE)range: >= 0
- (no CPE)range: >= 0
- (no CPE)range: >= 0
- (no CPE)range: >= 0
- (no CPE)range: >= 1.0.13, <= 1.0.14
- (no CPE)range: >= 0
- (no CPE)range: >= 0
- (no CPE)range: >= 1.6.10, < 1.7.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- github.com/advisories/GHSA-333g-rpr4-7hxqghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-15224ghsaADVISORY
- github.com/rest-client/rest-client/issues/713ghsax_refsource_MISCWEB
- github.com/rubygems/rubygems.org/issues/2097ghsaWEB
- github.com/rubysec/ruby-advisory-db/blob/master/gems/blockchain_wallet/CVE-2019-15224.ymlghsaWEB
- github.com/rubysec/ruby-advisory-db/blob/master/gems/coin_base/CVE-2019-15224.ymlghsaWEB
- github.com/rubysec/ruby-advisory-db/blob/master/gems/doge-coin/CVE-2019-15224.ymlghsaWEB
- github.com/rubysec/ruby-advisory-db/blob/master/gems/lita_coin/CVE-2019-15224.ymlghsaWEB
- github.com/rubysec/ruby-advisory-db/blob/master/gems/omniauth_amazon/CVE-2019-15224.ymlghsaWEB
- github.com/rubysec/ruby-advisory-db/blob/master/gems/rest-client/CVE-2019-15224.ymlghsaWEB
- rubygems.org/gems/rest-client/versions/mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.