CVE-2021-37533Improper Input Validation in Software Foundation Apache Commons NET

Severity
6.5MEDIUMNVD
EPSS
0.2%
top 51.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 3
Latest updateJul 15

Description

Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

NVDapache/commons_net< 3.9.0
CVEListV5apache_software_foundation/apache_commons_netApache Commons Net3.9.0
debiandebian/libcommons-net-java< libcommons-net-java 3.9.0-1 (bookworm)

Also affects: Debian Linux 10.0, 11.0

🔴Vulnerability Details

3
OSV
Apache Commons Net vulnerable to information leakage via malicious server2022-12-03
OSV
CVE-2021-37533: Prior to Apache Commons Net 32022-12-03
GHSA
Apache Commons Net vulnerable to information leakage via malicious server2022-12-03

📋Vendor Advisories

10
Oracle
Oracle Oracle Communications Applications Risk Matrix: JCA Adaptor (Apache Commons Net) — CVE-2021-375332024-07-15
Oracle
Oracle Oracle Communications Applications Risk Matrix: General (Apache Commons Net) — CVE-2021-375332024-04-15
Oracle
Oracle Oracle Communications Applications Risk Matrix: Order and Service Management (Apache Commons Net) — CVE-2021-375332024-01-15
Oracle
Oracle Oracle Commerce Risk Matrix: Content Acquisition System (Apache Commons Net) — CVE-2021-375332023-10-15
Oracle
Oracle Oracle Communications Applications Risk Matrix: Other (Apache Commons Net) — CVE-2021-375332023-07-15