An issue was discovered in Midnight Commander through 4.8.26. When establishing an SFTP connection, the fingerprint of the server is neither checked nor displayed. As a result, a user connects to the server without the ability to verify its authenticity.
References
Configurations
History
21 Nov 2024, 06:13
Type | Values Removed | Values Added |
---|---|---|
References | () https://docs.ssh-mitm.at/CVE-2021-36370.html - Exploit, Third Party Advisory | |
References | () https://github.com/MidnightCommander/mc/blob/5c1d3c55dd15356ec7d079084d904b7b0fd58d3e/src/vfs/sftpfs/connection.c#L484 - Exploit, Third Party Advisory | |
References | () https://github.com/MidnightCommander/mc/blob/master/src/vfs/sftpfs/connection.c - Exploit, Third Party Advisory | |
References | () https://mail.gnome.org/archives/mc-devel/2021-August/msg00008.html - Release Notes, Third Party Advisory | |
References | () https://midnight-commander.org/ - Vendor Advisory | |
References | () https://sourceforge.net/projects/mcwin32/files/ - Product, Third Party Advisory |
Information
Published : 2021-08-30 19:15
Updated : 2024-11-21 06:13
NVD link : CVE-2021-36370
Mitre link : CVE-2021-36370
CVE.ORG link : CVE-2021-36370
JSON object : View
Products Affected
midnight-commander
- midnight_commander
CWE
CWE-287
Improper Authentication