|
| 1 | +--- |
| 2 | +engine: ruby |
| 3 | +cve: 2021-32066 |
| 4 | +ghsa: gx49-h5r3-q3xj |
| 5 | +url: https://nvd.nist.gov/vuln/detail/CVE-2021-32066 |
| 6 | +title: imap - StartTLS stripping attack |
| 7 | +date: 2021-08-01 |
| 8 | +description: | |
| 9 | + An issue was discovered in Ruby through |
| 10 | + 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. |
| 11 | + Net::IMAP does not raise an exception when StartTLS fails with |
| 12 | + an an unknown response, which might allow man-in-the-middle |
| 13 | + attackers to bypass the TLS protections by leveraging a network |
| 14 | + position between the client and the registry to block the |
| 15 | + StartTLS command, aka a "StartTLS stripping attack." |
| 16 | +cvss_v2: 5.8 |
| 17 | +cvss_v3: 7.4 |
| 18 | +patched_versions: |
| 19 | + - "~> 2.6.8" |
| 20 | + - "~> 2.7.4" |
| 21 | + - ">= 3.0.2" |
| 22 | +related: |
| 23 | + url: |
| 24 | + - https://nvd.nist.gov/vuln/detail/CVE-2021-32066 |
| 25 | + - https://www.ruby-lang.org/en/news/2021/07/07/ruby-3-0-2-released |
| 26 | + - https://www.ruby-lang.org/en/news/2021/07/07/ruby-2-7-4-released |
| 27 | + - https://www.ruby-lang.org/en/news/2021/07/07/ruby-2-6-8-released |
| 28 | + - https://www.ruby-lang.org/en/news/2021/07/07/starttls-stripping-in-net-imap |
| 29 | + - https://github.com/ruby/ruby/commit/a21a3b7d23704a01d34bd79d09dc37897e00922a |
| 30 | + - https://hackerone.com/reports/1178562 |
| 31 | + - https://osv.dev/vulnerability/BIT-ruby-2021-32066?utm_source=copilot.com |
| 32 | + - https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html |
| 33 | + - https://lists.debian.org/debian-lts-announce/2021/10/msg00009.html |
| 34 | + - https://www.oracle.com/security-alerts/cpuapr2022.html |
| 35 | + - https://security.netapp.com/advisory/ntap-20210902-0004 |
| 36 | + - https://security.gentoo.org/glsa/202401-27 |
| 37 | + - https://github.com/advisories/GHSA-gx49-h5r3-q3xj |
0 commit comments