First published: Wed Jul 07 2021(Updated: )
A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes Net::FTP extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions). References: <a href="https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/">https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-ruby27-ruby | <0:2.7.4-130.el7 | 0:2.7.4-130.el7 |
redhat/rh-ruby30-ruby | <0:3.0.2-148.el7 | 0:3.0.2-148.el7 |
redhat/rh-ruby26-ruby | <0:2.6.9-120.el7 | 0:2.6.9-120.el7 |
Ruby-lang Ruby | <=2.6.7 | |
Ruby-lang Ruby | >=2.7.0<=2.7.3 | |
Ruby-lang Ruby | >=3.0.0<=3.0.1 | |
Fedoraproject Fedora | =34 | |
Debian Debian Linux | =9.0 | |
Oracle Jd Edwards Enterpriseone Tools | <9.2.6.1 | |
redhat/ruby | <3.0.2 | 3.0.2 |
redhat/ruby | <2.7.4 | 2.7.4 |
redhat/ruby | <2.6.8 | 2.6.8 |
redhat/rubygem-net-ftp | <0.1.3 | 0.1.3 |
All of | ||
Any of | ||
Ruby-lang Ruby | <=2.6.7 | |
Ruby-lang Ruby | >=2.7.0<=2.7.3 | |
Ruby-lang Ruby | >=3.0.0<=3.0.1 | |
Fedoraproject Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2021-31810.
The severity of CVE-2021-31810 is medium with a severity value of 5.4.
The affected software for CVE-2021-31810 is Ruby versions 2.6.7 through 2.6.8, 2.7.x through 2.7.3, and 3.x through 3.0.1.
A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port.
Yes, the fix for CVE-2021-31810 is to update to Ruby version 3.0.2.