Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-69rc-qfx4-h683

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 3.7

Описание

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.

EPSS

Процентиль: 33%
0.00129
Низкий

3.7 Low

CVSS3

Дефекты

CWE-200

Связанные уязвимости

CVSS3: 3.7
ubuntu
около 5 лет назад

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.

CVSS3: 3.1
redhat
около 5 лет назад

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.

CVSS3: 3.7
nvd
около 5 лет назад

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.

CVSS3: 3.7
msrc
около 5 лет назад

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port and this way potentially make curl extract information about services that are otherwise private and not disclosed for example doing port scanning and service banner extractions.

CVSS3: 3.7
debian
около 5 лет назад

A malicious server can use the FTP PASV response to trick curl 7.73.0 ...

EPSS

Процентиль: 33%
0.00129
Низкий

3.7 Low

CVSS3

Дефекты

CWE-200