CVE-2021-32749 — OS Command Injection in Fail2ban
Severity
8.1HIGHNVD
EPSS
0.3%
top 46.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 16
Latest updateSep 12
Description
fail2ban is a daemon to ban hosts that cause multiple authentication errors. In versions 0.9.7 and prior, 0.10.0 through 0.10.6, and 0.11.0 through 0.11.2, there is a vulnerability that leads to possible remote code execution in the mailing action mail-whois. Command `mail` from mailutils package used in mail actions like `mail-whois` can execute command if unescaped sequences (`\n~`) are available in "foreign" input (for instance in whois output). To exploit the vulnerability, an attacker would…
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9
Affected Packages4 packages
Also affects: Fedora 34, 35
Patches
🔴Vulnerability Details
1OSV▶
CVE-2021-32749: fail2ban is a daemon to ban hosts that cause multiple authentication errors↗2021-07-16