The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2022:0544 advisory.
– rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source (CVE-2020-36327)
– rubygem-rdoc: Command injection vulnerability in RDoc (CVE-2021-31799)
– ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host (CVE-2021-31810)
– ruby: StartTLS stripping vulnerability in Net::IMAP (CVE-2021-32066)
– ruby: Regular expression denial of service vulnerability of Date parsing methods (CVE-2021-41817)
– ruby: Cookie prefix spoofing in CGI::Cookie.parse (CVE-2021-41819)
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.Read More
References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31799http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31810https://access.redhat.com/errata/RHSA-2022:0544https://access.redhat.com/security/cve/CVE-2021-41817https://access.redhat.com/security/cve/CVE-2021-41819https://bugzilla.redhat.com/1980132https://access.redhat.com/security/cve/CVE-2021-31810https://access.redhat.com/security/cve/CVE-2020-36327http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32066https://bugzilla.redhat.com/1980126http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36327https://access.redhat.com/security/cve/CVE-2021-32066https://bugzilla.redhat.com/1958999http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41819http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41817https://bugzilla.redhat.com/1980128https://bugzilla.redhat.com/2025104https://bugzilla.redhat.com/2026757https://access.redhat.com/security/cve/CVE-2021-31799Back to Main