First published: Wed Jul 07 2021(Updated: )
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-ruby27-ruby | <0:2.7.4-130.el7 | 0:2.7.4-130.el7 |
redhat/rh-ruby30-ruby | <0:3.0.2-148.el7 | 0:3.0.2-148.el7 |
redhat/rh-ruby26-ruby | <0:2.6.9-120.el7 | 0:2.6.9-120.el7 |
redhat/ruby | <3.0.2 | 3.0.2 |
redhat/ruby | <2.7.4 | 2.7.4 |
redhat/ruby | <2.6.8 | 2.6.8 |
redhat/rubygem-net-imap | <0.2.2 | 0.2.2 |
Ruby | >=2.6.0<=2.6.7 | |
Ruby | >=2.7.0<=2.7.3 | |
Ruby | >=3.0.0<=3.0.1 | |
Oracle JD Edwards EnterpriseOne Tools | <9.2.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for this issue is CVE-2021-32066.
The severity of CVE-2021-32066 is high with a CVSS score of 7.4.
Ruby versions through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1 are affected by CVE-2021-32066.
A man-in-the-middle attacker can exploit CVE-2021-32066 by using it to prevent Ruby applications using Net::IMAP from enabling TLS encryption for a connection.
You can find more information about CVE-2021-32066 on the CVE website, NVD, Ruby's official website, and the Red Hat Bugzilla and Errata pages.