Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-31810
HistoryJul 13, 2021 - 12:00 a.m.

CVE-2021-31810

2021-07-1300:00:00
ubuntu.com
ubuntu.com
11

5.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.007 Low

EPSS

Percentile

80.1%

An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x
through 3.0.1. A malicious FTP server can use the PASV response to trick
Net::FTP into connecting back to a given IP address and port. This
potentially makes curl extract information about services that are
otherwise private and not disclosed (e.g., the attacker can conduct port
scans and service banner extractions).

Notes

Author Note
leosilva for xenial, the backport can be kind of intrusive. for now ignoring it.
OSVersionArchitecturePackageVersionFilename
ubuntu16.04noarchruby2.3< 2.3.1-2~ubuntu16.04.16+esm1) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
ubuntu18.04noarchruby2.5< 2.5.1-1ubuntu1.10UNKNOWN
ubuntu20.04noarchruby2.7< 2.7.0-5ubuntu1.5UNKNOWN
ubuntu20.10noarchruby2.7< 2.7.1-3ubuntu1.4UNKNOWN
ubuntu21.04noarchruby2.7< 2.7.2-4ubuntu1.2UNKNOWN
ubuntu21.10noarchruby2.7< 2.7.4-1ubuntu1UNKNOWN

5.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.007 Low

EPSS

Percentile

80.1%