Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-3251-1 | libcommons-net-java security update |
![]() |
DSA-5307-1 | libcommons-net-java security update |
![]() |
EUVD-2022-7599 | Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711. |
![]() |
GHSA-cgp8-4m63-fhh5 | Apache Commons Net vulnerable to information leakage via malicious server |
![]() |
USN-6037-1 | Apache Commons Net vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 14 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Thu, 24 Apr 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-04-24T15:25:18.237Z
Reserved: 2021-07-26T00:00:00.000Z
Link: CVE-2021-37533

Updated: 2024-08-04T01:23:01.166Z

Status : Modified
Published: 2022-12-03T15:15:09.747
Modified: 2025-04-24T16:15:18.227
Link: CVE-2021-37533


No data.