An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions).
References
Link | Resource |
---|---|
https://hackerone.com/reports/1145454 | Exploit Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/10/msg00009.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MWXHK5UUHVSHF7HTHMX6JY3WXDVNIHSL/ | |
https://security.gentoo.org/glsa/202401-27 | |
https://security.netapp.com/advisory/ntap-20210917-0001/ | Third Party Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
24 Jan 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
30 Apr 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Jul 2022, 17:42
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other |
12 May 2022, 14:07
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory | |
CPE | cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:* |
20 Apr 2022, 00:15
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | |
References |
|
|
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20210917-0001/ - Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2021/10/msg00009.html - Mailing List, Third Party Advisory |
13 Oct 2021, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Sep 2021, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Aug 2021, 15:22
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 5.8 |
CPE | cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:* |
|
CWE | CWE-668 | |
References |
|
|
References | (MISC) https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/ - Vendor Advisory | |
References | (MISC) https://hackerone.com/reports/1145454 - Exploit, Patch, Third Party Advisory |
13 Jul 2021, 13:48
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-07-13 13:15
Updated : 2024-02-04 21:47
NVD link : CVE-2021-31810
Mitre link : CVE-2021-31810
CVE.ORG link : CVE-2021-31810
JSON object : View
Products Affected
fedoraproject
- fedora
ruby-lang
- ruby
oracle
- jd_edwards_enterpriseone_tools
debian
- debian_linux
CWE