{
  "threat_severity" : "Moderate",
  "public_date" : "2021-07-07T00:00:00Z",
  "bugzilla" : {
    "description" : "ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host",
    "id" : "1980126",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1980126"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.4",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-200",
  "details" : [ "An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions).", "Ruby's Net::FTP module trusted the IP address included in the FTP server's response to the PASV command. A malicious FTP server could use this to make Ruby applications using the Net::FTP module to connect to arbitrary hosts and use this to perform port scanning or information extraction from systems not accessible from the FTP server." ],
  "statement" : "Red Hat CloudForms 5.11 does not ship Ruby or RubyGem net-ftp and thus not affected by the flaw. RubyGem net-sftp (Ruby implementation of Secure File Transfer Protocol) which product ship is different library component from the affected package.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2021-08-05T00:00:00Z",
    "advisory" : "RHSA-2021:3020",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "ruby:2.7-8040020210728141159.522a0ee4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2022-02-16T00:00:00Z",
    "advisory" : "RHSA-2022:0543",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "ruby:2.6-8050020211215144356.c5368500"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2022-02-24T00:00:00Z",
    "advisory" : "RHSA-2022:0672",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "ruby:2.5-8050020220216195847.c5368500"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions",
    "release_date" : "2022-02-21T00:00:00Z",
    "advisory" : "RHSA-2022:0581",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.1",
    "package" : "ruby:2.6-8010020220201152941.c27ad7f8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.2 Extended Update Support",
    "release_date" : "2022-02-21T00:00:00Z",
    "advisory" : "RHSA-2022:0582",
    "cpe" : "cpe:/a:redhat:rhel_eus:8.2",
    "package" : "ruby:2.6-8020020220201131207.4cda2c84"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Extended Update Support",
    "release_date" : "2022-02-16T00:00:00Z",
    "advisory" : "RHSA-2022:0544",
    "cpe" : "cpe:/a:redhat:rhel_eus:8.4",
    "package" : "ruby:2.6-8040020220131135901.522a0ee4"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux 7",
    "release_date" : "2021-09-20T00:00:00Z",
    "advisory" : "RHSA-2021:3559",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3::el7",
    "package" : "rh-ruby27-ruby-0:2.7.4-130.el7"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux 7",
    "release_date" : "2021-10-25T00:00:00Z",
    "advisory" : "RHSA-2021:3982",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3::el7",
    "package" : "rh-ruby30-ruby-0:3.0.2-148.el7"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux 7",
    "release_date" : "2022-02-28T00:00:00Z",
    "advisory" : "RHSA-2022:0708",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3::el7",
    "package" : "rh-ruby26-ruby-0:2.6.9-120.el7"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS",
    "release_date" : "2021-09-20T00:00:00Z",
    "advisory" : "RHSA-2021:3559",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3::el7",
    "package" : "rh-ruby27-ruby-0:2.7.4-130.el7"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS",
    "release_date" : "2021-10-25T00:00:00Z",
    "advisory" : "RHSA-2021:3982",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:3::el7",
    "package" : "rh-ruby30-ruby-0:3.0.2-148.el7"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "ruby",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "ruby",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Not affected",
    "package_name" : "ruby",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2021-31810\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-31810\nhttps://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/" ],
  "name" : "CVE-2021-31810",
  "csaw" : false
}