Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-32066

Опубликовано: 07 июл. 2021
Источник: redhat
CVSS3: 7.4
EPSS Низкий

Описание

An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."

Ruby's Net::IMAP module did not raise an exception when receiving an unexpected response to the STARTTLS command and the connection was not upgraded to use TLS. A man-in-the-middle attacker could use this flaw to prevent Ruby applications using Net::IMAP to enable TLS encryption for a connection to an IMAP server and subsequently eavesdrop on or modify data sent over the plain text connection.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6rubyNot affected
Red Hat Enterprise Linux 7rubyOut of support scope
Red Hat Enterprise Linux 9rubyNot affected
Red Hat Enterprise Linux 8rubyFixedRHSA-2021:302005.08.2021
Red Hat Enterprise Linux 8rubyFixedRHSA-2022:054316.02.2022
Red Hat Enterprise Linux 8rubyFixedRHSA-2022:067224.02.2022
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionsrubyFixedRHSA-2022:058121.02.2022
Red Hat Enterprise Linux 8.2 Extended Update SupportrubyFixedRHSA-2022:058221.02.2022
Red Hat Enterprise Linux 8.4 Extended Update SupportrubyFixedRHSA-2022:054416.02.2022
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-ruby27-rubyFixedRHSA-2021:355920.09.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-319
https://bugzilla.redhat.com/show_bug.cgi?id=1980128ruby: StartTLS stripping vulnerability in Net::IMAP

EPSS

Процентиль: 33%
0.00126
Низкий

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.4
ubuntu
почти 4 года назад

An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."

CVSS3: 7.4
nvd
почти 4 года назад

An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."

CVSS3: 7.4
debian
почти 4 года назад

An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, an ...

CVSS3: 7.4
github
около 3 лет назад

An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."

CVSS3: 6.5
fstec
около 4 лет назад

Уязвимость реализации класса Net::IMAP интерпретатора Ruby, позволяющая нарушителю реализовать атаку типа «человек посередине»

EPSS

Процентиль: 33%
0.00126
Низкий

7.4 High

CVSS3

Уязвимость CVE-2021-32066