First published: Mon Mar 29 2021(Updated: )
An issue was discovered in PortSwigger Burp Suite before 2021.2. During viewing of a malicious request, it can be manipulated into issuing a request that does not respect its upstream proxy configuration. This could leak NetNTLM hashes on Windows systems that fail to block outbound SMB.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Burp Suite | <2021.2 | |
Burp Suite | <2021.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29416 is considered a high-severity vulnerability due to the potential exposure of sensitive NetNTLM hashes.
To fix CVE-2021-29416, update your PortSwigger Burp Suite to version 2021.2 or later.
CVE-2021-29416 affects versions of PortSwigger Burp Suite prior to 2021.2 running on Windows systems with improperly configured outbound SMB blocking.
CVE-2021-29416 could lead to the leakage of sensitive NetNTLM hashes, which can compromise user credentials.
Yes, CVE-2021-29416 affects both the Professional and Community editions of PortSwigger Burp Suite before version 2021.2.