{"id":"BIT-ruby-2021-32066","details":"An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a \"StartTLS stripping attack.\"","aliases":["BIT-ruby-min-2021-32066","CVE-2021-32066"],"modified":"2025-04-03T14:40:37.652Z","published":"2024-03-06T11:05:08.777Z","database_specific":{"severity":"High","cpes":["cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*"]},"references":[{"type":"WEB","url":"https://github.com/ruby/ruby/commit/a21a3b7d23704a01d34bd79d09dc37897e00922a"},{"type":"WEB","url":"https://hackerone.com/reports/1178562"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2021/10/msg00009.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202401-27"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20210902-0004/"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"type":"WEB","url":"https://www.ruby-lang.org/en/news/2021/07/07/starttls-stripping-in-net-imap/"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-32066"}],"affected":[{"package":{"name":"ruby","ecosystem":"Bitnami","purl":"pkg:bitnami/ruby"},"ranges":[{"type":"SEMVER","events":[{"introduced":"2.6.0"},{"fixed":"2.6.8"},{"introduced":"2.7.0"},{"fixed":"2.7.4"},{"introduced":"3.0.0"},{"fixed":"3.0.2"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/ruby/BIT-ruby-2021-32066.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}]}],"schema_version":"1.7.3"}