Skip to content

bentoboxinfosec

many parts make the whole

  • Home
  • Blog
  • CTF Cheat Sheet
  • About
  • Home
  • 2021
  • September
  • 21
  • REMOTE CODE EXECUTION in fail2ban – CVE-2021-32749

REMOTE CODE EXECUTION in fail2ban – CVE-2021-32749

Posted on September 21, 2021May 26, 2023 By topbento No Comments on REMOTE CODE EXECUTION in fail2ban – CVE-2021-32749
News, Vulnerability

fail2ban is very useful piece of software that stops brute forcing attacks on a variety of services. Knowing that fail2ban exists is serious source of frustration for me personally when I am completing a vulnerable machine or an exercise and the solution is “just brute force credentials using hydra and X wordlist.” In the back of my mind I’m always sighing and saying, “This isn’t a thing in the real world, it hasn’t been a thing for a long time.”

But what happens when the cure is the problem? CVE-2021-32749 has been disclosed and allows for Remote Code Execution in fail2ban. The vulnerability allows a bad actor to perform command injection by controlling the whois information associated with their IP address. The vulnerability has been patched in versions 0.10.7 and 0.11.3. As a workaround you can avoid the usage of action mail-whois.

Full writeup here!

MITRE

NIST

Tags: CVE-2021-32749 cybersecurity news fail2ban informationsecurity news

Post navigation

❮ Previous Post: REMOTE CODE EXECUTION in Zoom from Pwn2Own 2021
Next Post: FULL EXTRACTION of NVIDIA TSEC ❯

You may also like

Uncategorized
BACKDOOR IN WIDELY USED Linux UTILITY TARGETS SSH CONNECTIONS
March 30, 2024
News
PrintNightmare – REMOTE CODE EXECUTION in Windows Spooler Service CVE-2021-1675
July 1, 2021
News
MOST VULNERABILITIES CAN BE EXPLOITED BY GPT-4 BY READING THREAT ADVISORIES
April 19, 2024
News
CITY OF DALLAS RANSOMWARE ATTACK
May 4, 2023

Leave a Reply Cancel reply

You must be logged in to post a comment.

Recent Posts

  • Salt Typhoon THREAT ACTORS SPOTTED ON US GOVT NETWORKS BEFORE TELCOS
  • Charter and Windstream ADDED TO LIST OF TELCO PROVIDERS COMPROMISED BY Salt Typhoon
  • Cisco CONFIRMS AUTHENTICITY OF 4.45 GB DATA BREACH
  • NINTH TELECOM COMPANY ADDED TO LIST OF Salt Typhoon TARGETS
  • McDonald’s API EXPLOITED FOR ONE CENT DELIVERIES

Recent Comments

No comments to show.

Archives

  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • May 2024
  • April 2024
  • March 2024
  • September 2023
  • August 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • August 2022
  • July 2022
  • May 2022
  • April 2022
  • March 2022
  • January 2022
  • December 2021
  • November 2021
  • September 2021
  • August 2021
  • July 2021
  • January 2021
  • December 2020
  • August 2020
  • May 2020
  • March 2020
  • February 2020
  • October 2019
  • June 2019
  • April 2019

Categories

  • Breach
  • Cloud
  • Conferences
  • Hardware Hacking
  • Malware
  • News
  • Ransomware
  • Tools
  • Tutorial
  • Uncategorized
  • Vulnerability
  • Walkthough
  • Home
  • Blog
  • CTF Cheat Sheet
  • About
  • Twitter
  • Github
  • YouTube

Copyright © 2026 bentoboxinfosec.

Theme: Oceanly News Dark by ScriptsTown