CVE-2021-31810Resource Exposure in Ruby

Severity
5.8MEDIUMNVD
OSV7.0
EPSS
0.6%
top 29.63%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 13
Latest updateMay 24

Description

An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions).

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages3 packages

Debianjruby/jruby< 9.3.9.0+ds-1+2
NVDruby-lang/ruby2.7.02.7.3+2

Also affects: Debian Linux 9.0

Patches

🔴Vulnerability Details

4
GHSA
GHSA-wr95-679j-87v9: An issue was discovered in Ruby through 22022-05-24
OSV
ruby2.3, ruby2.5, ruby2.7 vulnerabilities2021-07-21
OSV
CVE-2021-31810: An issue was discovered in Ruby through 22021-07-13
CVEList
CVE-2021-31810: An issue was discovered in Ruby through 22021-07-13

📋Vendor Advisories

3
Ubuntu
Ruby vulnerabilities2021-07-21
Red Hat
ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host2021-07-07
Debian
CVE-2021-31810: jruby - An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x thro...2021

💬Community

1
Bugzilla
CVE-2021-31810 ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host2021-07-07
CVE-2021-31810 — Resource Exposure in Ruby-lang Ruby | cvebase