From db1a6d529d72d6cd6bc4d0e4e62a403847966923 Mon Sep 17 00:00:00 2001 From: Arnout Engelen Date: Sat, 3 Dec 2022 15:54:51 +0100 Subject: [PATCH] Apache Commons Net --- 2021/37xxx/CVE-2021-37533.json | 80 +++++++++++++++++++++++++++++++--- 1 file changed, 73 insertions(+), 7 deletions(-) diff --git a/2021/37xxx/CVE-2021-37533.json b/2021/37xxx/CVE-2021-37533.json index f97f7a0687f..759ea807866 100644 --- a/2021/37xxx/CVE-2021-37533.json +++ b/2021/37xxx/CVE-2021-37533.json @@ -1,18 +1,84 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@apache.org", "ID": "CVE-2021-37533", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Apache Commons Net's FTP client trusts the host from PASV response by default" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Apache Commons Net", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "Apache Commons Net", + "version_value": "3.9.0" + } + ] + } + } + ] + }, + "vendor_name": "Apache Software Foundation" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Apache Commons would like to thank ZeddYu Lu for reporting this issue." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client.\nThe default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.\n" } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": [ + { + "other": "low" + } + ], + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://lists.apache.org/thread/o6yn9r9x6s94v97264hmgol1sf48mvx7" + } + ] + }, + "source": { + "defect": [ + "NET-711" + ], + "discovery": "UNKNOWN" } -} \ No newline at end of file +}