5.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
7.4 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
0.01 Low
EPSS
Percentile
83.7%
Severity: High
Date : 2021-07-14
CVE-ID : CVE-2021-31799 CVE-2021-31810 CVE-2021-32066
Package : ruby2.6
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-2140
The package ruby2.6 before version 2.6.8-1 is vulnerable to multiple
issues including silent downgrade, arbitrary command execution and
information disclosure.
Upgrade to 2.6.8-1.
The problems have been fixed upstream in version 2.6.8.
None.
RDoc before version 6.3.1, as bundled with Ruby before version 2.7.4
and 2.6.8 as well as GitLab before version 14.0.2, used to call
Kernel#open to open a local file. If a Ruby project has a file whose
name starts with β|β and ends with βtagsβ, the command following the
pipe character is executed. A malicious Ruby project could exploit it
to run an arbitrary command execution against a user who attempts to
run the rdoc command.
A security issue has been discovered in Ruby before versions 3.0.2,
2.7.4 and 2.6.8. A malicious FTP server can use the PASV response to
trick Net::FTP into connecting back to a given IP address and port.
This potentially makes Net::FTP extract information about services that
are otherwise private and not disclosed (e.g., the attacker can conduct
port scans and service banner extractions).
A security issue has been discovered in Ruby before versions 3.0.2,
2.7.4 and 2.6.8. Net::IMAP does not raise an exception when StartTLS
fails with an unknown response, which might allow man-in-the-middle
attackers to bypass the TLS protections by leveraging a network
position between the client and the registry to block the StartTLS
command, aka a βStartTLS stripping attackβ.
A remote man-in-the-middle attacker could strip StartTLS encryption
from IMAP connections to disclose authentication credentials and
emails. Furthermore, a malicious FTP server could induce connections to
an arbitrary IP address and port on a client, leading to potential
information disclosure.
https://www.ruby-lang.org/en/news/2021/05/02/os-command-injection-in-rdoc/
https://github.com/ruby/rdoc/commit/a7f5d6ab88632b3b482fe10611382ff73d14eed7
https://github.com/ruby/ruby/commit/483f303d02e768b69e476e0b9be4ab2f26389522
https://github.com/ruby/ruby/commit/fe3c49c9baeeab58304ede915b7edd18ecf360fc
https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/
https://hackerone.com/reports/1145454
https://github.com/ruby/net-ftp/commit/5709ece67cf57a94655e34532f8a7899b28d496a
https://www.ruby-lang.org/en/news/2021/07/07/starttls-stripping-in-net-imap/
https://hackerone.com/reports/1178562
https://github.com/ruby/net-imap/commit/adba6f0c3e5c5607c4822b9120322eb7e9a77891
https://security.archlinux.org/CVE-2021-31799
https://security.archlinux.org/CVE-2021-31810
https://security.archlinux.org/CVE-2021-32066
github.com/ruby/net-ftp/commit/5709ece67cf57a94655e34532f8a7899b28d496a
github.com/ruby/net-imap/commit/adba6f0c3e5c5607c4822b9120322eb7e9a77891
github.com/ruby/rdoc/commit/a7f5d6ab88632b3b482fe10611382ff73d14eed7
github.com/ruby/ruby/commit/483f303d02e768b69e476e0b9be4ab2f26389522
github.com/ruby/ruby/commit/fe3c49c9baeeab58304ede915b7edd18ecf360fc
hackerone.com/reports/1145454
hackerone.com/reports/1178562
security.archlinux.org/AVG-2140
security.archlinux.org/CVE-2021-31799
security.archlinux.org/CVE-2021-31810
security.archlinux.org/CVE-2021-32066
www.ruby-lang.org/en/news/2021/05/02/os-command-injection-in-rdoc/
www.ruby-lang.org/en/news/2021/07/07/starttls-stripping-in-net-imap/
www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/
5.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
7.4 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
0.01 Low
EPSS
Percentile
83.7%