StartTLS Vulnerability in Ruby's IMAP Library Affecting Various Versions
CVE-2021-32066
7.4HIGH
What is CVE-2021-32066?
A vulnerability in the Net::IMAP component of Ruby allows man-in-the-middle attackers to exploit the lack of exception raising when StartTLS fails due to an unknown response. This oversight can lead to a StartTLS stripping attack, enabling an attacker positioned between the client and the server to inhibit the StartTLS command, compromising the encrypted communication channel intended to protect sensitive data.
References
CVSS V3.1
Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved