{"api_version":"1","generated_at":"2026-04-22T21:27:34+00:00","cve":"CVE-2021-31810","urls":{"html":"https://cve.report/CVE-2021-31810","api":"https://cve.report/api/cve/CVE-2021-31810.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-31810","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-31810"},"summary":{"title":"CVE-2021-31810","description":"An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions).","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2021-07-13 13:15:00","updated_at":"2024-01-24 05:15:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"https://www.oracle.com/security-alerts/cpuapr2022.html","name":"https://www.oracle.com/security-alerts/cpuapr2022.html","refsource":"MISC","tags":[],"title":"Oracle Critical Patch Update Advisory - April 2022","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://hackerone.com/reports/1145454","name":"https://hackerone.com/reports/1145454","refsource":"MISC","tags":[],"title":"HackerOne","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWXHK5UUHVSHF7HTHMX6JY3WXDVNIHSL/","name":"FEDORA-2021-36cdab1f8d","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 34 Update: ruby-3.0.2-149.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.gentoo.org/glsa/202401-27","name":"GLSA-202401-27","refsource":"","tags":[],"title":"Ruby: Multiple vulnerabilities (GLSA 202401-27) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/","name":"https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/","refsource":"MISC","tags":[],"title":"CVE-2021-31810: Trusting FTP PASV responses vulnerability in Net::FTP","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2021/10/msg00009.html","name":"[debian-lts-announce] 20211013 [SECURITY] [DLA 2780-1] ruby2.3 security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 2780-1] ruby2.3 security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html","name":"[debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3408-1] jruby security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.netapp.com/advisory/ntap-20210917-0001/","name":"https://security.netapp.com/advisory/ntap-20210917-0001/","refsource":"CONFIRM","tags":[],"title":"CVE-2021-31810 Ruby Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MWXHK5UUHVSHF7HTHMX6JY3WXDVNIHSL/","name":"FEDORA-2021-36cdab1f8d","refsource":"","tags":[],"title":"[SECURITY] Fedora 34 Update: ruby-3.0.2-149.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-31810","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-31810","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"31810","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"31810","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"34","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"31810","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jd_edwards_enterpriseone_tools","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"31810","vulnerable":"1","versionEndIncluding":"2.6.7","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ruby-lang","cpe5":"ruby","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"31810","vulnerable":"1","versionEndIncluding":"2.7.3","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ruby-lang","cpe5":"ruby","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"31810","vulnerable":"1","versionEndIncluding":"3.0.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ruby-lang","cpe5":"ruby","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-31810","qid":"159326","title":"Oracle Enterprise Linux Security Update for ruby:2.7 (ELSA-2021-3020)"},{"cve":"CVE-2021-31810","qid":"159635","title":"Oracle Enterprise Linux Security Update for ruby:2.6 (ELSA-2022-0543)"},{"cve":"CVE-2021-31810","qid":"159682","title":"Oracle Enterprise Linux Security Update for ruby:2.5 (ELSA-2022-0672)"},{"cve":"CVE-2021-31810","qid":"159692","title":"Oracle Enterprise Linux Security Update for ruby:2.5 (ELSA-2022-0672-1)"},{"cve":"CVE-2021-31810","qid":"178838","title":"Debian Security Update for ruby2.3 (DLA 2780-1)"},{"cve":"CVE-2021-31810","qid":"179051","title":"Debian Security Update for ruby2.5 (DSA 5066-1)"},{"cve":"CVE-2021-31810","qid":"179891","title":"Debian Security Update for ruby2.7 (CVE-2021-31810)"},{"cve":"CVE-2021-31810","qid":"181757","title":"Debian Security Update for jruby (DLA 3408-1)"},{"cve":"CVE-2021-31810","qid":"198440","title":"Ubuntu Security Notification for Ruby vulnerabilities (USN-5020-1)"},{"cve":"CVE-2021-31810","qid":"239536","title":"Red Hat Update for ruby:2.7 (RHSA-2021:3020)"},{"cve":"CVE-2021-31810","qid":"239644","title":"Red Hat Update for rh-ruby27-ruby (RHSA-2021:3559)"},{"cve":"CVE-2021-31810","qid":"239651","title":"Red Hat Update for rh-ruby27-ruby (RHSA-2021:3559)"},{"cve":"CVE-2021-31810","qid":"239736","title":"Red Hat Update for rh-ruby30-ruby (RHSA-2021:3982)"},{"cve":"CVE-2021-31810","qid":"240090","title":"Red Hat Update for ruby:2.6 (RHSA-2022:0544)"},{"cve":"CVE-2021-31810","qid":"240092","title":"Red Hat Update for ruby:2.6 (RHSA-2022:0543)"},{"cve":"CVE-2021-31810","qid":"240108","title":"Red Hat Update for ruby:2.5 (RHSA-2022:0672)"},{"cve":"CVE-2021-31810","qid":"240116","title":"Red Hat Update for rh-ruby26-ruby security (RHSA-2022:0708)"},{"cve":"CVE-2021-31810","qid":"240156","title":"Red Hat Update for ruby:2.6 (RHSA-2022:0582)"},{"cve":"CVE-2021-31810","qid":"281749","title":"Fedora Security Update for ruby (FEDORA-2021-36cdab1f8d)"},{"cve":"CVE-2021-31810","qid":"356177","title":"Amazon Linux Security Advisory for ruby : ALASRUBY3.0-2023-005"},{"cve":"CVE-2021-31810","qid":"356272","title":"Amazon Linux Security Advisory for ruby : ALASRUBY2.6-2023-004"},{"cve":"CVE-2021-31810","qid":"356464","title":"Amazon Linux Security Advisory for ruby : ALAS2RUBY2.6-2023-004"},{"cve":"CVE-2021-31810","qid":"356497","title":"Amazon Linux Security Advisory for ruby : ALAS2RUBY3.0-2023-005"},{"cve":"CVE-2021-31810","qid":"377094","title":"Alibaba Cloud Linux Security Update for ruby:2.7 (ALINUX3-SA-2021:0054)"},{"cve":"CVE-2021-31810","qid":"500616","title":"Alpine Linux Security Update for ruby"},{"cve":"CVE-2021-31810","qid":"504376","title":"Alpine Linux Security Update for ruby"},{"cve":"CVE-2021-31810","qid":"670835","title":"EulerOS Security Update for ruby (EulerOS-SA-2021-2721)"},{"cve":"CVE-2021-31810","qid":"670875","title":"EulerOS Security Update for ruby (EulerOS-SA-2021-2696)"},{"cve":"CVE-2021-31810","qid":"670957","title":"EulerOS Security Update for ruby (EulerOS-SA-2021-2643)"},{"cve":"CVE-2021-31810","qid":"671404","title":"EulerOS Security Update for ruby (EulerOS-SA-2022-1337)"},{"cve":"CVE-2021-31810","qid":"710844","title":"Gentoo Linux Ruby Multiple Vulnerabilities (GLSA 202401-27)"},{"cve":"CVE-2021-31810","qid":"751413","title":"SUSE Enterprise Linux Security Update for ruby2.5 (SUSE-SU-2021:3838-1)"},{"cve":"CVE-2021-31810","qid":"751423","title":"SUSE Enterprise Linux Security Update for ruby2.1 (SUSE-SU-2021:3837-1)"},{"cve":"CVE-2021-31810","qid":"751432","title":"OpenSUSE Security Update for ruby2.5 (openSUSE-SU-2021:3838-1)"},{"cve":"CVE-2021-31810","qid":"751459","title":"OpenSUSE Security Update for ruby2.5 (openSUSE-SU-2021:1535-1)"},{"cve":"CVE-2021-31810","qid":"752103","title":"SUSE Enterprise Linux Security Update for ruby2.5 (SUSE-SU-2022:1512-1)"},{"cve":"CVE-2021-31810","qid":"940383","title":"AlmaLinux Security Update for ruby:2.7 (ALSA-2021:3020)"},{"cve":"CVE-2021-31810","qid":"940455","title":"AlmaLinux Security Update for ruby:2.6 (ALSA-2022:0543)"},{"cve":"CVE-2021-31810","qid":"940459","title":"AlmaLinux Security Update for ruby:2.5 (ALSA-2022:0672)"},{"cve":"CVE-2021-31810","qid":"960315","title":"Rocky Linux Security Update for ruby:2.7 (RLSA-2021:3020)"},{"cve":"CVE-2021-31810","qid":"960814","title":"Rocky Linux Security Update for ruby:2.6 (RLSA-2022:0543)"},{"cve":"CVE-2021-31810","qid":"960817","title":"Rocky Linux Security Update for ruby:2.5 (RLSA-2022:0672)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2021-31810","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions)."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://hackerone.com/reports/1145454","refsource":"MISC","name":"https://hackerone.com/reports/1145454"},{"refsource":"FEDORA","name":"FEDORA-2021-36cdab1f8d","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWXHK5UUHVSHF7HTHMX6JY3WXDVNIHSL/"},{"refsource":"MLIST","name":"[debian-lts-announce] 20211013 [SECURITY] [DLA 2780-1] ruby2.3 security update","url":"https://lists.debian.org/debian-lts-announce/2021/10/msg00009.html"},{"url":"https://www.oracle.com/security-alerts/cpuapr2022.html","refsource":"MISC","name":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"refsource":"MISC","name":"https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/","url":"https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20210917-0001/","url":"https://security.netapp.com/advisory/ntap-20210917-0001/"},{"refsource":"MLIST","name":"[debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update","url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html"}]}},"nvd":{"publishedDate":"2021-07-13 13:15:00","lastModifiedDate":"2024-01-24 05:15:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.8,"baseSeverity":"MEDIUM"},"exploitabilityScore":3.9,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*","versionEndIncluding":"2.6.7","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*","versionStartIncluding":"2.7.0","versionEndIncluding":"2.7.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0.0","versionEndIncluding":"3.0.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*","versionEndExcluding":"9.2.6.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"31810","Ordinal":"207104","Title":"CVE-2021-31810","CVE":"CVE-2021-31810","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"31810","Ordinal":"1","NoteData":"An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions).","Type":"Description","Title":null},{"CveYear":"2021","CveId":"31810","Ordinal":"2","NoteData":"2021-07-13","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"31810","Ordinal":"3","NoteData":"2021-10-13","Type":"Other","Title":"Modified"}]}}}