CVE-2021-37533 Detail

Current Description

Prior to Apache Commons Net 3.9.0, Net’s FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.

View Analysis Description

Analysis Description

Prior to Apache Commons Net 3.9.0, Net’s FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.

Severity

CVSS 3.x Severity and Metrics:

CVSS 2.0 Severity and Metrics:

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source
CWE-20 Improper Input Validation Apache Software Foundation  

Change History

3 change records found show changes

Initial Analysis by NIST 12/06/2022 8:01:07 AM

Action Type Old Value New Value
Added CPE Configuration
OR
     *cpe:2.3:a:apache:commons_net:*:*:*:*:*:*:*:* versions up to (excluding) 3.9.0
Added CVSS V3.1
NIST AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Changed Reference Type
http://www.openwall.com/lists/oss-security/2022/12/03/1 No Types Assigned
http://www.openwall.com/lists/oss-security/2022/12/03/1 Issue Tracking, Mailing List, Third Party Advisory
Changed Reference Type
https://lists.apache.org/thread/o6yn9r9x6s94v97264hmgol1sf48mvx7 No Types Assigned
https://lists.apache.org/thread/o6yn9r9x6s94v97264hmgol1sf48mvx7 Issue Tracking, Mailing List, Vendor Advisory

CVE Modified by Apache Software Foundation 12/03/2022 2:15:11 PM

Action Type Old Value New Value
Added Reference
http://www.openwall.com/lists/oss-security/2022/12/03/1 [No Types Assigned]

CVE Modified by Apache Software Foundation 12/03/2022 11:15:09 AM

Action Type Old Value New Value
Changed Description
Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client.
The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.
Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.

Quick Info

CVE Dictionary Entry:
CVE-2021-37533
NVD Published Date:
12/03/2022
NVD Last Modified:
12/06/2022
Source:
Apache Software Foundation