Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3251-1 | libcommons-net-java security update |
Debian DSA |
DSA-5307-1 | libcommons-net-java security update |
EUVD |
EUVD-2022-7599 | Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711. |
Github GHSA |
GHSA-cgp8-4m63-fhh5 | Apache Commons Net vulnerable to information leakage via malicious server |
Ubuntu USN |
USN-6037-1 | Apache Commons Net vulnerability |
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 24 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-04-24T15:25:18.237Z
Reserved: 2021-07-26T00:00:00.000Z
Link: CVE-2021-37533
Updated: 2024-08-04T01:23:01.166Z
Status : Modified
Published: 2022-12-03T15:15:09.747
Modified: 2025-04-24T16:15:18.227
Link: CVE-2021-37533
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN