CVE-2021-38133

7.4 HIGH

📋 TL;DR

CVE-2021-38133 is an external service interaction vulnerability in OpenText eDirectory that allows attackers to force the server to make unauthorized requests to internal or external systems. This affects all versions before 9.2.6.0000, potentially enabling SSRF-like attacks and information disclosure.

💻 Affected Systems

Products:
  • OpenText eDirectory
Versions: All versions before 9.2.6.0000
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could pivot through the eDirectory server to access internal services, exfiltrate sensitive data, or perform attacks against other systems using the server's network position.

🟠

Likely Case

Information disclosure from internal services, potential denial of service through resource exhaustion, or limited data exfiltration from accessible internal endpoints.

🟢

If Mitigated

Limited impact with proper network segmentation, egress filtering, and service account restrictions preventing significant lateral movement.

🌐 Internet-Facing: HIGH - Internet-facing eDirectory servers can be directly targeted to probe internal networks and services.
🏢 Internal Only: MEDIUM - Internal servers still pose risk for lateral movement but require initial network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

External service interaction vulnerabilities typically require minimal technical skill to exploit once the attack vector is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.2.6.0000

Vendor Advisory: https://www.netiq.com/documentation/edirectory-92/edirectory926_releasenotes/data/edirectory926_releasenotes.html

Restart Required: Yes

Instructions:

1. Download eDirectory 9.2.6.0000 from OpenText support portal. 2. Backup current installation and data. 3. Run the installer with administrative privileges. 4. Restart eDirectory services after installation completes.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict eDirectory server outbound network access to only necessary services

Firewall Rules

all

Implement egress filtering to prevent eDirectory from reaching internal services

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate eDirectory from sensitive internal services
  • Deploy web application firewall rules to detect and block external service interaction patterns

🔍 How to Verify

Check if Vulnerable:

Check eDirectory version via administration console or by examining installed packages. Versions below 9.2.6.0000 are vulnerable.

Check Version:

ndsconfig get | grep "Version" or check via eDirectory administration interface

Verify Fix Applied:

Confirm version is 9.2.6.0000 or higher and test that external service interaction attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound connection attempts from eDirectory server
  • HTTP/S requests to internal IP ranges from eDirectory process

Network Indicators:

  • eDirectory server making unexpected connections to internal services
  • Traffic patterns suggesting SSRF attempts

SIEM Query:

source="edirectory" AND (dest_ip IN [internal_ranges] OR url_contains="localhost" OR url_contains="127.0.0.1")

🔗 References

📤 Share & Export