CVE-2021-38133
📋 TL;DR
CVE-2021-38133 is an external service interaction vulnerability in OpenText eDirectory that allows attackers to force the server to make unauthorized requests to internal or external systems. This affects all versions before 9.2.6.0000, potentially enabling SSRF-like attacks and information disclosure.
💻 Affected Systems
- OpenText eDirectory
📦 What is this software?
Edirectory by Microfocus
⚠️ Risk & Real-World Impact
Worst Case
Attackers could pivot through the eDirectory server to access internal services, exfiltrate sensitive data, or perform attacks against other systems using the server's network position.
Likely Case
Information disclosure from internal services, potential denial of service through resource exhaustion, or limited data exfiltration from accessible internal endpoints.
If Mitigated
Limited impact with proper network segmentation, egress filtering, and service account restrictions preventing significant lateral movement.
🎯 Exploit Status
External service interaction vulnerabilities typically require minimal technical skill to exploit once the attack vector is understood.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 9.2.6.0000
Vendor Advisory: https://www.netiq.com/documentation/edirectory-92/edirectory926_releasenotes/data/edirectory926_releasenotes.html
Restart Required: Yes
Instructions:
1. Download eDirectory 9.2.6.0000 from OpenText support portal. 2. Backup current installation and data. 3. Run the installer with administrative privileges. 4. Restart eDirectory services after installation completes.
🔧 Temporary Workarounds
Network Segmentation
allRestrict eDirectory server outbound network access to only necessary services
Firewall Rules
allImplement egress filtering to prevent eDirectory from reaching internal services
🧯 If You Can't Patch
- Implement strict network segmentation to isolate eDirectory from sensitive internal services
- Deploy web application firewall rules to detect and block external service interaction patterns
🔍 How to Verify
Check if Vulnerable:
Check eDirectory version via administration console or by examining installed packages. Versions below 9.2.6.0000 are vulnerable.
Check Version:
ndsconfig get | grep "Version" or check via eDirectory administration interface
Verify Fix Applied:
Confirm version is 9.2.6.0000 or higher and test that external service interaction attempts are blocked.
📡 Detection & Monitoring
Log Indicators:
- Unusual outbound connection attempts from eDirectory server
- HTTP/S requests to internal IP ranges from eDirectory process
Network Indicators:
- eDirectory server making unexpected connections to internal services
- Traffic patterns suggesting SSRF attempts
SIEM Query:
source="edirectory" AND (dest_ip IN [internal_ranges] OR url_contains="localhost" OR url_contains="127.0.0.1")