First published: Thu May 13 2021(Updated: )
An issue was discovered in Prosody before 0.11.9. The proxy65 component allows open access by default, even if neither of the users has an XMPP account on the local server, allowing unrestricted use of the server's bandwidth.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/prosody | 0.11.2-1+deb10u4 0.11.9-2+deb11u2 0.12.3-1 0.12.4-1 | |
Prosody Prosody | <0.11.9 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-32917.
The severity of CVE-2021-32917 is medium.
The affected software for CVE-2021-32917 is Prosody.
You can fix CVE-2021-32917 by updating to Prosody version 0.11.9 or later.
You can find more information about CVE-2021-32917 at the following references: [1](https://www.openwall.com/lists/oss-security/2021/05/13/1), [2](https://prosody.im/security/advisory_20210512.txt), [3](https://hg.prosody.im/trunk/rev/65dcc175ef5b).