6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
0.003 Low
EPSS
Percentile
65.5%
Prior to Apache Commons Net 3.9.0, Net’s FTP client trusts the host from
PASV response by default. A malicious server can redirect the Commons Net
code to use a different host, but the user has to connect to the malicious
server in the first place. This may lead to leakage of information about
services running on the private network of the client. The default in
version 3.9.0 is now false to ignore such hosts, as cURL does. See
https://issues.apache.org/jira/browse/NET-711.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | libcommons-net-java | < 3.6-1+deb11u1build0.18.04.1 | UNKNOWN |
ubuntu | 20.04 | noarch | libcommons-net-java | < 3.6-1+deb11u1build0.20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | libcommons-net-java | < 3.6-1+deb11u1build0.22.04.1 | UNKNOWN |
ubuntu | 22.10 | noarch | libcommons-net-java | < 3.6-1+deb11u1build0.22.10.1 | UNKNOWN |
ubuntu | 16.04 | noarch | libcommons-net-java | < 3.4-2ubuntu2+esm1 | UNKNOWN |
github.com/apache/commons-net/commit/b0bff89f70cfea70009e22f87639816cc3993974 (commons-net-3.9.0-RC1)
issues.apache.org/jira/browse/NET-711
launchpad.net/bugs/cve/CVE-2021-37533
lists.apache.org/thread/o6yn9r9x6s94v97264hmgol1sf48mvx7
nvd.nist.gov/vuln/detail/CVE-2021-37533
security-tracker.debian.org/tracker/CVE-2021-37533
www.cve.org/CVERecord?id=CVE-2021-37533