CVE-2021-36370

An issue was discovered in Midnight Commander through 4.8.26. When establishing an SFTP connection, the fingerprint of the server is neither checked nor displayed. As a result, a user connects to the server without the ability to verify its authenticity.
Configurations

Configuration 1 (hide)

cpe:2.3:a:midnight-commander:midnight_commander:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:13

Type Values Removed Values Added
References () https://docs.ssh-mitm.at/CVE-2021-36370.html - Exploit, Third Party Advisory () https://docs.ssh-mitm.at/CVE-2021-36370.html - Exploit, Third Party Advisory
References () https://github.com/MidnightCommander/mc/blob/5c1d3c55dd15356ec7d079084d904b7b0fd58d3e/src/vfs/sftpfs/connection.c#L484 - Exploit, Third Party Advisory () https://github.com/MidnightCommander/mc/blob/5c1d3c55dd15356ec7d079084d904b7b0fd58d3e/src/vfs/sftpfs/connection.c#L484 - Exploit, Third Party Advisory
References () https://github.com/MidnightCommander/mc/blob/master/src/vfs/sftpfs/connection.c - Exploit, Third Party Advisory () https://github.com/MidnightCommander/mc/blob/master/src/vfs/sftpfs/connection.c - Exploit, Third Party Advisory
References () https://mail.gnome.org/archives/mc-devel/2021-August/msg00008.html - Release Notes, Third Party Advisory () https://mail.gnome.org/archives/mc-devel/2021-August/msg00008.html - Release Notes, Third Party Advisory
References () https://midnight-commander.org/ - Vendor Advisory () https://midnight-commander.org/ - Vendor Advisory
References () https://sourceforge.net/projects/mcwin32/files/ - Product, Third Party Advisory () https://sourceforge.net/projects/mcwin32/files/ - Product, Third Party Advisory

Information

Published : 2021-08-30 19:15

Updated : 2024-11-21 06:13


NVD link : CVE-2021-36370

Mitre link : CVE-2021-36370

CVE.ORG link : CVE-2021-36370


JSON object : View

Products Affected

midnight-commander

  • midnight_commander
CWE
CWE-287

Improper Authentication