CVE-2020-8284

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
3.7 LOW
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
hackeroneCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 21%
VendorProductVersion
haxxcurl
𝑥
≤ 7.73.0
debiandebian_linux
9.0
debiandebian_linux
10.0
netappclustered_data_ontap
-
netapphci_management_node
-
netappsolidfire
-
netapphci_storage_node
-
netapphci_bootstrap_os
-
applemac_os_x
10.14.0 ≤
𝑥
< 10.14.6
applemac_os_x
10.15 ≤
𝑥
< 10.15.7
applemac_os_x
10.14.6:security_update_2019-001
applemac_os_x
10.14.6:security_update_2019-002
applemac_os_x
10.14.6:security_update_2019-004
applemac_os_x
10.14.6:security_update_2019-005
applemac_os_x
10.14.6:security_update_2019-006
applemac_os_x
10.14.6:security_update_2019-007
applemac_os_x
10.14.6:security_update_2020-001
applemac_os_x
10.14.6:security_update_2020-002
applemac_os_x
10.14.6:security_update_2020-003
applemac_os_x
10.14.6:security_update_2020-004
applemac_os_x
10.14.6:security_update_2020-005
applemac_os_x
10.14.6:security_update_2020-006
applemac_os_x
10.14.6:security_update_2020-007
applemac_os_x
10.14.6:security_update_2021-001
applemac_os_x
10.14.6:security_update_2021-002
applemac_os_x
10.14.6:supplemental_update
applemac_os_x
10.14.6:supplemental_update_2
applemac_os_x
10.15.7
applemac_os_x
10.15.7:security_update_2020
applemac_os_x
10.15.7:security_update_2020-001
applemac_os_x
10.15.7:security_update_2020-005
applemac_os_x
10.15.7:security_update_2020-007
applemac_os_x
10.15.7:security_update_2021-001
applemac_os_x
10.15.7:supplemental_update
applemacos
11.0.1
applemacos
11.1
applemacos
11.2
oraclecommunications_billing_and_revenue_management
12.0.0.3.0
oraclecommunications_cloud_native_core_policy
1.14.0
oracleessbase
21.2
oraclepeoplesoft_enterprise_peopletools
8.58
siemenssinec_infrastructure_network_services
𝑥
< 1.0.1.1
splunkuniversal_forwarder
8.2.0 ≤
𝑥
< 8.2.12
splunkuniversal_forwarder
9.0.0 ≤
𝑥
< 9.0.6
splunkuniversal_forwarder
9.1.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
curl
bullseye
7.74.0-1.3+deb11u13
fixed
bullseye (security)
7.74.0-1.3+deb11u11
fixed
bookworm
7.88.1-10+deb12u7
fixed
bookworm (security)
7.88.1-10+deb12u5
fixed
sid
8.10.1-2
fixed
trixie
8.10.1-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
curl
groovy
Fixed 7.68.0-1ubuntu4.2
released
focal
Fixed 7.68.0-1ubuntu2.4
released
bionic
Fixed 7.58.0-2ubuntu3.12
released
xenial
Fixed 7.47.0-1ubuntu2.18
released
trusty
Fixed 7.35.0-1ubuntu2.20+esm6
released
References