ID | CVE-2021-32066 | ||||||
Sažetak | An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack." | ||||||
Reference |
|
||||||
CVSS |
|
||||||
Pristup |
|
||||||
Impact |
|
||||||
CVSS vektor | AV:N/AC:M/Au:N/C:P/I:P/A:N | ||||||
Zadnje važnije ažuriranje | 24-01-2024 - 05:15 | ||||||
Objavljeno | 01-08-2021 - 19:15 |