Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-37533

Опубликовано: 03 дек. 2022
Источник: debian
EPSS Низкий

Описание

Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libcommons-net-javafixed3.9.0-1package

Примечания

  • https://lists.apache.org/thread/o6yn9r9x6s94v97264hmgol1sf48mvx7

  • https://issues.apache.org/jira/browse/NET-711

  • https://github.com/apache/commons-net/commit/b0bff89f70cfea70009e22f87639816cc3993974 (commons-net-3.9.0-RC1)

EPSS

Процентиль: 44%
0.00214
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 3 лет назад

Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.

CVSS3: 6.5
redhat
около 3 лет назад

Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.

CVSS3: 6.5
nvd
больше 3 лет назад

Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.

CVSS3: 6.5
github
больше 3 лет назад

Apache Commons Net vulnerable to information leakage via malicious server

CVSS3: 6.5
fstec
около 4 лет назад

Уязвимость компонента FTP Client библиотеки Apache Commons Net, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и осуществить CSRF-атаку

EPSS

Процентиль: 44%
0.00214
Низкий