Vulnerability identifier: #VU55488
Vulnerability risk: Medium
Exploitation vector: Network
Exploit availability: No
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists within Net::FTP in Ruby when processing PASV responses. A remote attacker can trick the victim to connect to a malicious FTP server and trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions).
Install updates from vendor's website.
Vulnerable software versions
Ruby: 2.6.0 - 3.0.1
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?