Vulnerability Details CVE-2021-32066
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 33.0%
CVSS Severity
CVSS v3 Score 7.4
CVSS v2 Score 5.8
Products affected by CVE-2021-32066
-
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:-
-
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:4.0.1.0
-
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.1
-
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.1.5
-
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2
-
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2.0.0
-
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2.4.0
-
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2.4.2
-
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2.5.0
-
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2.5.3
-
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2.6.0
-
cpe:2.3:a:ruby-lang:ruby:2.6.0
-
cpe:2.3:a:ruby-lang:ruby:2.6.1
-
cpe:2.3:a:ruby-lang:ruby:2.6.2
-
cpe:2.3:a:ruby-lang:ruby:2.6.3
-
cpe:2.3:a:ruby-lang:ruby:2.6.4
-
cpe:2.3:a:ruby-lang:ruby:2.6.5
-
cpe:2.3:a:ruby-lang:ruby:2.6.6
-
cpe:2.3:a:ruby-lang:ruby:2.6.7
-
cpe:2.3:a:ruby-lang:ruby:2.7.0
-
cpe:2.3:a:ruby-lang:ruby:2.7.1
-
cpe:2.3:a:ruby-lang:ruby:2.7.2
-
cpe:2.3:a:ruby-lang:ruby:2.7.3
-
cpe:2.3:a:ruby-lang:ruby:3.0.0
-
cpe:2.3:a:ruby-lang:ruby:3.0.1