First published: Sat Dec 03 2022(Updated: )
Apache Commons Net could allow a remote attacker to obtain sensitive information, caused by an issue with the FTP client trusts the host from PASV response by default. By persuading a victim to connect to specially-crafted server, an attacker could exploit this vulnerability to obtain information about services running on the private network, and use this information to launch further attacks against the affected system.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libcommons-net-java | <=3.6-1 | 3.6-1+deb10u1 3.6-1+deb11u1 3.9.0-1 |
Apache Commons Net | <3.9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
redhat/apache-commons-net | <3.9.0 | 3.9.0 |
IBM IBM® Engineering Requirements Management DOORS | <=9.7.2.7 | |
IBM IBM® Engineering Requirements Management DOORS Web Access | <=9.7.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-37533.
The severity of CVE-2021-37533 is medium with a CVSS score of 6.5.
The affected software includes Apache Commons Net version up to and exclusive of 3.9.0 and IBM Disconnected Log Collector versions up to and inclusive of v1.0 - v1.8.2.
CVE-2021-37533 allows a malicious server to redirect the Apache Commons Net code to use a different host, potentially leading to information leakage.
To fix CVE-2021-37533, update to Apache Common Net version 3.9.0 or later.