CVE-2021-32066

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/08/2021
Last modified:
24/01/2024

Description

An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:* 2.6.0 (including) 2.6.7 (including)
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:* 2.7.0 (including) 2.7.3 (including)
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:* 3.0.0 (including) 3.0.1 (including)
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:* 9.2.6.1 (excluding)