Skip to content

bentoboxinfosec

many parts make the whole

  • Home
  • Blog
  • CTF Cheat Sheet
  • About
  • Home
  • 2021
  • September
  • 21
  • REMOTE CODE EXECUTION in fail2ban – CVE-2021-32749

REMOTE CODE EXECUTION in fail2ban – CVE-2021-32749

Posted on September 21, 2021May 26, 2023 By topbento No Comments on REMOTE CODE EXECUTION in fail2ban – CVE-2021-32749
News, Vulnerability

fail2ban is very useful piece of software that stops brute forcing attacks on a variety of services. Knowing that fail2ban exists is serious source of frustration for me personally when I am completing a vulnerable machine or an exercise and the solution is “just brute force credentials using hydra and X wordlist.” In the back of my mind I’m always sighing and saying, “This isn’t a thing in the real world, it hasn’t been a thing for a long time.”

But what happens when the cure is the problem? CVE-2021-32749 has been disclosed and allows for Remote Code Execution in fail2ban. The vulnerability allows a bad actor to perform command injection by controlling the whois information associated with their IP address. The vulnerability has been patched in versions 0.10.7 and 0.11.3. As a workaround you can avoid the usage of action mail-whois.

Full writeup here!

MITRE

NIST

Tags: CVE-2021-32749 cybersecurity news fail2ban informationsecurity news

Post navigation

❮ Previous Post: REMOTE CODE EXECUTION in Zoom from Pwn2Own 2021
Next Post: FULL EXTRACTION of NVIDIA TSEC ❯

You may also like

News
ADBLOCK PLUS – ARBITRARY CODE EXECUTION
April 17, 2019
Breach
NordVPN COMPROMISE
October 24, 2019
News
KERNEL STACK BUFFER OVERFLOW in Linux – CVE-2023-0179
January 16, 2023
News
NVIDIA GEFORCE EXPERIENCE OS COMMAND INJECTION
June 7, 2019

Leave a Reply Cancel reply

You must be logged in to post a comment.

Recent Posts

  • Salt Typhoon THREAT ACTORS SPOTTED ON US GOVT NETWORKS BEFORE TELCOS
  • Charter and Windstream ADDED TO LIST OF TELCO PROVIDERS COMPROMISED BY Salt Typhoon
  • Cisco CONFIRMS AUTHENTICITY OF 4.45 GB DATA BREACH
  • NINTH TELECOM COMPANY ADDED TO LIST OF Salt Typhoon TARGETS
  • McDonald’s API EXPLOITED FOR ONE CENT DELIVERIES

Recent Comments

No comments to show.

Archives

  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • May 2024
  • April 2024
  • March 2024
  • September 2023
  • August 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • August 2022
  • July 2022
  • May 2022
  • April 2022
  • March 2022
  • January 2022
  • December 2021
  • November 2021
  • September 2021
  • August 2021
  • July 2021
  • January 2021
  • December 2020
  • August 2020
  • May 2020
  • March 2020
  • February 2020
  • October 2019
  • June 2019
  • April 2019

Categories

  • Breach
  • Cloud
  • Conferences
  • Hardware Hacking
  • Malware
  • News
  • Ransomware
  • Tools
  • Tutorial
  • Uncategorized
  • Vulnerability
  • Walkthough
  • Home
  • Blog
  • CTF Cheat Sheet
  • About
  • Twitter
  • Github
  • YouTube

Copyright © 2025 bentoboxinfosec.

Theme: Oceanly News Dark by ScriptsTown