5.8

CVE-2021-31810

Exploit

An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions).

Data is provided by the National Vulnerability Database (NVD)
Ruby-langRuby Version <= 2.6.7
   FedoraprojectFedora Version34
Ruby-langRuby Version >= 2.7.0 <= 2.7.3
   FedoraprojectFedora Version34
Ruby-langRuby Version >= 3.0.0 <= 3.0.1
   FedoraprojectFedora Version34
DebianDebian Linux Version9.0
OracleJd Edwards Enterpriseone Tools Version < 9.2.6.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.63% 0.694
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5.8 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:P/I:N/A:N