HomeRuby-LangCVE-2021-31810

CVE-2021-31810

MEDIUM
5.8CVSS
Published: 2021-07-13
Updated: 2024-11-21
AI Analysis

Description

An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions).

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
changed
Confidentiality
low
Integrity
none
Availability
none
Weaknesses
NVD-CWE-Other

Metadata

Primary Vendor
RUBY-LANG
Published
7/13/2021
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

ruby-lang : rubyruby-lang : rubyruby-lang : rubydebian : debian_linuxoracle : jd_edwards_enterpriseone_tools

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2021-31810 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com