Alpaquita LinuxStreamSecurity Advisory
Search Cve

CVE-2021-31810

Published: August 31, 2023Last modified: August 31, 2023

Description

An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions).

Severity score breakdown

ParameterValue
Base score5.8
Attack VectorNETWORK
Attack complexityLOW
Privileges requiredNONE
User interactionNONE
ScopeCHANGED
ConfidentialityLOW
Integrity impactNONE
Availability impactNONE
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTSrubyNot affected (3.1.4-r0)
StreamrubyNot affected (3.2.2-r0)

References

ON THIS PAGE