Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-28296

Опубликовано: 26 фев. 2026
Источник: redhat
CVSS3: 4.3

Описание

A flaw was found in the FTP GVfs backend. A remote attacker could exploit this input validation vulnerability by supplying specially crafted file paths containing carriage return and line feed (CRLF) sequences. These unsanitized sequences allow the attacker to terminate intended FTP commands and inject arbitrary FTP commands, potentially leading to arbitrary code execution or other severe impacts.

Отчет

The GVfs FTP backend is vulnerable to command injection due to improper sanitization of user-supplied file paths. An attacker could craft a malicious FTP path containing CRLF sequences to inject arbitrary FTP commands. This primarily impacts systems where users interact with untrusted FTP servers or open specially crafted FTP links through applications utilizing GVfs, typically in desktop environments.

Меры по смягчению последствий

To reduce the risk associated with this vulnerability, users should avoid connecting to untrusted FTP servers or opening FTP links from unverified sources. Implementing network-level restrictions, such as firewall rules, to limit outbound connections to only trusted FTP servers can further mitigate potential exposure. If the GVfs FTP backend is not essential for daily operations, consider removing or disabling packages that provide this functionality, though this action may affect other desktop environment features that rely on GVfs for FTP access.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10gvfsFix deferred
Red Hat Enterprise Linux 6gvfsFix deferred
Red Hat Enterprise Linux 7gvfsFix deferred
Red Hat Enterprise Linux 8gvfsFix deferred
Red Hat Enterprise Linux 9gvfsFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-93
https://bugzilla.redhat.com/show_bug.cgi?id=2443003gvfs: FTP GVfs backend: Arbitrary FTP command injection via CRLF sequences in file paths

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.3
ubuntu
29 дней назад

A flaw was found in the FTP GVfs backend. A remote attacker could exploit this input validation vulnerability by supplying specially crafted file paths containing carriage return and line feed (CRLF) sequences. These unsanitized sequences allow the attacker to terminate intended FTP commands and inject arbitrary FTP commands, potentially leading to arbitrary code execution or other severe impacts.

CVSS3: 4.3
nvd
29 дней назад

A flaw was found in the FTP GVfs backend. A remote attacker could exploit this input validation vulnerability by supplying specially crafted file paths containing carriage return and line feed (CRLF) sequences. These unsanitized sequences allow the attacker to terminate intended FTP commands and inject arbitrary FTP commands, potentially leading to arbitrary code execution or other severe impacts.

CVSS3: 4.3
debian
29 дней назад

A flaw was found in the FTP GVfs backend. A remote attacker could expl ...

CVSS3: 4.3
github
29 дней назад

A flaw was found in the FTP GVfs backend. A remote attacker could exploit this input validation vulnerability by supplying specially crafted file paths containing carriage return and line feed (CRLF) sequences. These unsanitized sequences allow the attacker to terminate intended FTP commands and inject arbitrary FTP commands, potentially leading to arbitrary code execution or other severe impacts.

suse-cvrf
9 дней назад

Security update for gvfs

4.3 Medium

CVSS3