Vulnerabilites related to apache - commons_net
Vulnerability from fkie_nvd
Published
2022-12-03 15:15
Modified
2024-11-21 06:15
Severity ?
Summary
Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.
References
▼ | URL | Tags | |
---|---|---|---|
security@apache.org | http://www.openwall.com/lists/oss-security/2022/12/03/1 | Issue Tracking, Mailing List, Third Party Advisory | |
security@apache.org | https://lists.apache.org/thread/o6yn9r9x6s94v97264hmgol1sf48mvx7 | Issue Tracking, Mailing List, Vendor Advisory | |
security@apache.org | https://lists.debian.org/debian-lts-announce/2022/12/msg00038.html | Mailing List, Third Party Advisory | |
security@apache.org | https://www.debian.org/security/2022/dsa-5307 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/12/03/1 | Issue Tracking, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread/o6yn9r9x6s94v97264hmgol1sf48mvx7 | Issue Tracking, Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2022/12/msg00038.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2022/dsa-5307 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | commons_net | * | |
debian | debian_linux | 10.0 | |
debian | debian_linux | 11.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:apache:commons_net:*:*:*:*:*:*:*:*", matchCriteriaId: "8D18D6BE-FFA1-46BD-AA12-6C84B7E7B896", versionEndExcluding: "3.9.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", matchCriteriaId: "FA6FEEC2-9F11-4643-8827-749718254FED", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.", }, { lang: "es", value: "Antes de Apache Commons Net 3.9.0, el cliente FTP de Net confía en el host desde la respuesta PASV de forma predeterminada. Un servidor malicioso puede redirigir el código de Commons Net para utilizar un host diferente, pero el usuario debe conectarse al servidor malicioso en primer lugar. Esto puede provocar una fuga de información sobre los servicios que se ejecutan en la red privada del cliente. El valor predeterminado en la versión 3.9.0 ahora es falso para ignorar dichos hosts, como lo hace cURL. Consulte https://issues.apache.org/jira/browse/NET-711.", }, ], id: "CVE-2021-37533", lastModified: "2024-11-21T06:15:19.503", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-12-03T15:15:09.747", references: [ { source: "security@apache.org", tags: [ "Issue Tracking", "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2022/12/03/1", }, { source: "security@apache.org", tags: [ "Issue Tracking", "Mailing List", "Vendor Advisory", ], url: "https://lists.apache.org/thread/o6yn9r9x6s94v97264hmgol1sf48mvx7", }, { source: "security@apache.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2022/12/msg00038.html", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2022/dsa-5307", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2022/12/03/1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Mailing List", "Vendor Advisory", ], url: "https://lists.apache.org/thread/o6yn9r9x6s94v97264hmgol1sf48mvx7", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2022/12/msg00038.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2022/dsa-5307", }, ], sourceIdentifier: "security@apache.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "security@apache.org", type: "Primary", }, ], }
cve-2021-37533
Vulnerability from cvelistv5
Published
2022-12-03 00:00
Modified
2024-08-04 01:23
Severity ?
EPSS score ?
Summary
Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Commons Net |
Version: Apache Commons Net < 3.9.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T01:23:01.166Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://lists.apache.org/thread/o6yn9r9x6s94v97264hmgol1sf48mvx7", }, { name: "[oss-security] 20221203 CVE-2021-37533: Apache Commons Net's FTP client trusts the host from PASV response by default", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2022/12/03/1", }, { name: "[debian-lts-announce] 20221229 [SECURITY] [DLA 3251-1] libcommons-net-java security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2022/12/msg00038.html", }, { name: "DSA-5307", tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.debian.org/security/2022/dsa-5307", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Apache Commons Net", vendor: "Apache Software Foundation", versions: [ { lessThan: "3.9.0", status: "affected", version: "Apache Commons Net", versionType: "custom", }, ], }, ], credits: [ { lang: "en", value: "Apache Commons would like to thank ZeddYu Lu for reporting this issue.", }, ], descriptions: [ { lang: "en", value: "Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.", }, ], metrics: [ { other: { content: { other: "low", }, type: "unknown", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20 Improper Input Validation", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-12-30T00:00:00", orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", shortName: "apache", }, references: [ { url: "https://lists.apache.org/thread/o6yn9r9x6s94v97264hmgol1sf48mvx7", }, { name: "[oss-security] 20221203 CVE-2021-37533: Apache Commons Net's FTP client trusts the host from PASV response by default", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2022/12/03/1", }, { name: "[debian-lts-announce] 20221229 [SECURITY] [DLA 3251-1] libcommons-net-java security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2022/12/msg00038.html", }, { name: "DSA-5307", tags: [ "vendor-advisory", ], url: "https://www.debian.org/security/2022/dsa-5307", }, ], source: { defect: [ "NET-711", ], discovery: "UNKNOWN", }, title: "Apache Commons Net's FTP client trusts the host from PASV response by default", x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", assignerShortName: "apache", cveId: "CVE-2021-37533", datePublished: "2022-12-03T00:00:00", dateReserved: "2021-07-26T00:00:00", dateUpdated: "2024-08-04T01:23:01.166Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }