
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-32066 is a StartTLS stripping vulnerability discovered in Ruby's Net::IMAP library affecting versions through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. The vulnerability was discovered and reported by Alexandr Savca and publicly disclosed on July 7, 2021 (Ruby Lang).
The vulnerability exists in Net::IMAP implementation where it fails to raise an exception when StartTLS fails with an unknown response. This behavior could allow man-in-the-middle attackers to bypass TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, resulting in what is known as a 'StartTLS stripping attack' (Ruby Lang, CVE Mitre).
A successful exploitation of this vulnerability could allow man-in-the-middle attackers to bypass TLS encryption, potentially leading to disclosure of sensitive information transmitted between the client and the IMAP server (Red Hat).
The vulnerability has been fixed in Ruby versions after 2.6.7, 2.7.3, and 3.0.1. Users are strongly recommended to upgrade to the patched versions. For Ruby 3.0.1 users, while net-imap is a default gem, there is a packaging issue, so it's recommended to upgrade Ruby itself rather than just the gem (Ruby Lang).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."