ALAS2RUBY3.0-2023-005 --- rubyID: oval:org.secpod.oval:def:1701769 | Date: (C)2023-10-26 (M)2024-05-09 |
Class: PATCH | Family: unix |
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed . An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
Product: |
ruby |
rubygem-bigdecimal |
rubygem-bundler |
rubygem-rexml |
rubygem-io-console |
rubygem-irb |
rubygem-json |
rubygem-minitest |
rubygem-rss |
rubygem-rbs |
rubygem-power_assert |
rubygem-psych |
rubygem-rdoc |
rubygem-test-unit |
rubygem-typeprof |
rubygems |
rubygem-rake |