Lucene search

K
githubGitHub Advisory DatabaseGHSA-CGP8-4M63-FHH5
HistoryDec 03, 2022 - 3:30 p.m.

Apache Commons Net vulnerable to information leakage via malicious server

2022-12-0315:30:26
CWE-20
GitHub Advisory Database
github.com
34
apache commons net
ftp client
vulnerability
information leakage
malicious server
version 3.9.0

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

0.003 Low

EPSS

Percentile

65.5%

Prior to Apache Commons Net 3.9.0, Net’s FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client.
The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.

Affected configurations

Vulners
Node
apachecommons_netRange<3.9.0
CPENameOperatorVersion
commons-net:commons-netlt3.9.0

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

0.003 Low

EPSS

Percentile

65.5%