VYPR
Critical severityNVD Advisory· Published Aug 19, 2019· Updated Aug 5, 2024

CVE-2019-15224

CVE-2019-15224

Description

The rest-client gem 1.6.10 through 1.6.13 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. Versions <=1.6.9 and >=1.6.14 are unaffected.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A code-execution backdoor was inserted by a third party into rest-client gem versions 1.6.10–1.6.13 on RubyGems.org.

Vulnerability

Overview The rest-client gem versions 1.6.10 through 1.6.13, distributed on RubyGems.org, contained a malicious backdoor that allowed remote code execution. The backdoor was inserted by an attacker who compromised a maintainer's RubyGems.org account and published the tainted versions [1][2]. Versions ≤1.6.9 and ≥1.6.14 are unaffected [1].

Exploitation

In Rails applications where Rails.env starts with "p" (such as "production"), the malicious code would execute and download a payload from a Pastebin.com URL, then run it on the server [2]. The payload reportedly communicated with a command-and-control server at mironanoru.zzz.com.ua [2]. Only users who explicitly pinned to the 1.6.x series and updated to the backdoored versions in the week before discovery were at risk; the 1.6.x line was superseded by 1.7.0 in 2014 [2].

Impact

An attacker could achieve arbitrary code execution on the affected system, leading to full compromise. The observed payload was used for cryptocurrency mining, but the backdoor could have been leveraged for any purpose, including data theft or further malware deployment [2].

Mitigation

The RubyGems security team yanked the malicious gem versions and locked the compromised maintainer account on August 19, 2019 [2][4]. The rest-client maintainers released version 1.6.14, identical to the clean 1.6.9, to supersede the affected versions [2]. Users should update to 1.6.14 or later, or downgrade to ≤1.6.9. Affected versions can be detected with grep --include='Gemfile.lock' -r . -e 'rest-client (1.6.1[0123])' [2].

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
rest-clientRubyGems
>= 1.6.10, < 1.7.01.7.0
cron_parserRubyGems
>= 1.0.13, <= 1.0.14
coin_baseRubyGems
>= 0
blockchain_walletRubyGems
>= 0
awesome-botRubyGems
>= 0
doge-coinRubyGems
>= 0
capistrano-colorsRubyGems
>= 0
bitcoin_vanityRubyGems
>= 0
coming-soonRubyGems
>= 0
omniauth_amazonRubyGems
>= 0

Affected products

11

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

11

News mentions

0

No linked articles in our index yet.