Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-37533

Опубликовано: 15 фев. 2023
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.

A flaw was found in Apache Commons Net's FTP, where the client trusts the host from PASV response by default. A malicious server could redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This issue could lead to leakage of information about services running on the private network of the client.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Clients 2apache-commons-netNot affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch6-rhel8Not affected
Migration Toolkit for Applications 6io.netty-netty-tcnative-parentWill not fix
Migration Toolkit for Applications 6org.jboss.windup-windup-parentNot affected
Migration Toolkit for Runtimesio.netty-netty-tcnative-parentWill not fix
Migration Toolkit for Runtimesorg.jboss.windup-windup-parentNot affected
OpenShift Developer Tools and Servicesjenkins-2-pluginsAffected
Red Hat Data Grid 8apache-commons-netWill not fix
Red Hat Decision Manager 7apache-commons-netNot affected
Red Hat Enterprise Linux 7apache-commons-netWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=2169924apache-commons-net: FTP client trusts the host from PASV response by default

EPSS

Процентиль: 44%
0.00214
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 3 лет назад

Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.

CVSS3: 6.5
nvd
около 3 лет назад

Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.

CVSS3: 6.5
debian
около 3 лет назад

Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host fr ...

CVSS3: 6.5
github
около 3 лет назад

Apache Commons Net vulnerable to information leakage via malicious server

CVSS3: 6.5
fstec
почти 4 года назад

Уязвимость компонента FTP Client библиотеки Apache Commons Net, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и осуществить CSRF-атаку

EPSS

Процентиль: 44%
0.00214
Низкий

6.5 Medium

CVSS3