CVE-2021-31810

Source
https://cve.org/CVERecord?id=CVE-2021-31810
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-31810.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-31810
Aliases
Downstream
Related
Published
2021-07-13T13:15:09.243Z
Modified
2026-03-15T14:44:08.510298Z
Severity
  • 5.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions).

References

Affected packages

Git / github.com/ruby/ruby

Affected ranges

Type
GIT
Repo
https://github.com/ruby/ruby
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
Last affected
Introduced
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "2.6.7"
        },
        {
            "introduced": "2.7.0"
        },
        {
            "last_affected": "2.7.3"
        },
        {
            "introduced": "3.0.0"
        },
        {
            "last_affected": "3.0.1"
        }
    ]
}

Affected versions

Other
v2_7_0
v2_7_1
v2_7_2
v2_7_3
v3_0_0
v3_0_1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-31810.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "9.0"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "9.2.6.1"
            }
        ]
    }
]