Vulnerability Details : CVE-2021-31810
Potential exploit
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions).
Products affected by CVE-2021-31810
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
- cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-31810
0.68%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 70 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-31810
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
5.8
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N |
3.9
|
1.4
|
NIST |
References for CVE-2021-31810
-
https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html
[SECURITY] [DLA 3408-1] jruby security update
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWXHK5UUHVSHF7HTHMX6JY3WXDVNIHSL/
Mailing List;Third Party Advisory
-
https://www.oracle.com/security-alerts/cpuapr2022.html
Oracle Critical Patch Update Advisory - April 2022Patch;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2021/10/msg00009.html
[SECURITY] [DLA 2780-1] ruby2.3 security updateMailing List;Third Party Advisory
-
https://security.gentoo.org/glsa/202401-27
Ruby: Multiple vulnerabilities (GLSA 202401-27) — Gentoo security
-
https://hackerone.com/reports/1145454
#1145454 lib/net/ftp.rb: trusting PASV responses allow client abuseExploit;Patch;Third Party Advisory
-
https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/
CVE-2021-31810: Trusting FTP PASV responses vulnerability in Net::FTPVendor Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MWXHK5UUHVSHF7HTHMX6JY3WXDVNIHSL/
[SECURITY] Fedora 34 Update: ruby-3.0.2-149.fc34 - package-announce - Fedora Mailing-Lists
-
https://security.netapp.com/advisory/ntap-20210917-0001/
CVE-2021-31810 Ruby Vulnerability in NetApp Products | NetApp Product SecurityThird Party Advisory
Jump to