CVE-2021-32749OS Command Injection in Fail2ban

Severity
8.1HIGHNVD
EPSS
0.3%
top 46.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 16
Latest updateSep 12

Description

fail2ban is a daemon to ban hosts that cause multiple authentication errors. In versions 0.9.7 and prior, 0.10.0 through 0.10.6, and 0.11.0 through 0.11.2, there is a vulnerability that leads to possible remote code execution in the mailing action mail-whois. Command `mail` from mailutils package used in mail actions like `mail-whois` can execute command if unescaped sequences (`\n~`) are available in "foreign" input (for instance in whois output). To exploit the vulnerability, an attacker would

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages4 packages

debiandebian/fail2ban< fail2ban 0.11.2-2 (bookworm)
NVDfail2ban/fail2ban0.10.00.10.7+2
Debianfail2ban/fail2ban< 0.11.2-2+3
CVEListV5fail2ban/fail2ban>= 0.10.0, <= 0.10.6, >= 0.11.0, <= 0.11.2+1

Also affects: Fedora 34, 35

Patches

🔴Vulnerability Details

1
OSV
CVE-2021-32749: fail2ban is a daemon to ban hosts that cause multiple authentication errors2021-07-16

📋Vendor Advisories

2
Ubuntu
Fail2ban vulnerability2022-09-12
Debian
CVE-2021-32749: fail2ban - fail2ban is a daemon to ban hosts that cause multiple authentication errors. In ...2021
CVE-2021-32749 — OS Command Injection in Fail2ban | cvebase