CVE-2021-31810

An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions).
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*

History

24 Jan 2024, 05:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202401-27 -

07 Nov 2023, 03:35

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWXHK5UUHVSHF7HTHMX6JY3WXDVNIHSL/', 'name': 'FEDORA-2021-36cdab1f8d', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MWXHK5UUHVSHF7HTHMX6JY3WXDVNIHSL/ -

30 Apr 2023, 23:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html -

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-668 NVD-CWE-Other

12 May 2022, 14:07

Type Values Removed Values Added
References (MISC) https://www.oracle.com/security-alerts/cpuapr2022.html - (MISC) https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory
First Time Oracle
Oracle jd Edwards Enterpriseone Tools
CPE cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*

20 Apr 2022, 00:15

Type Values Removed Values Added
References
  • (MISC) https://www.oracle.com/security-alerts/cpuapr2022.html -

06 Nov 2021, 03:24

Type Values Removed Values Added
References (CONFIRM) https://security.netapp.com/advisory/ntap-20210917-0001/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20210917-0001/ - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/10/msg00009.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/10/msg00009.html - Mailing List, Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

13 Oct 2021, 17:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/10/msg00009.html -

17 Sep 2021, 22:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20210917-0001/ -

05 Aug 2021, 15:22

Type Values Removed Values Added
CPE cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 5.8
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWXHK5UUHVSHF7HTHMX6JY3WXDVNIHSL/ - Mailing List, Third Party Advisory
References (MISC) https://hackerone.com/reports/1145454 - (MISC) https://hackerone.com/reports/1145454 - Exploit, Patch, Third Party Advisory
References (MISC) https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/ - (MISC) https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/ - Vendor Advisory
CWE CWE-668

13 Jul 2021, 13:48

Type Values Removed Values Added
New CVE

Information

Published : 2021-07-13 13:15

Updated : 2024-01-24 05:15


NVD link : CVE-2021-31810

Mitre link : CVE-2021-31810

CVE.ORG link : CVE-2021-31810


JSON object : View

Products Affected

fedoraproject

  • fedora

oracle

  • jd_edwards_enterpriseone_tools

debian

  • debian_linux

ruby-lang

  • ruby