A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "12.0.0.3.0"
}
]
},
{
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "1.14.0"
}
]
},
{
"cpe": "cpe:2.3:a:oracle:essbase:21.2:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "21.2"
}
]
},
{
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.58"
}
]
},
{
"cpe": "cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"fixed": "1.0.1.1"
}
]
},
{
"cpe": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "8.2.0"
},
{
"fixed": "8.2.12"
},
{
"introduced": "9.0.0"
},
{
"fixed": "9.0.6"
}
]
},
{
"cpe": "cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "9.1.0"
}
]
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "10.14.0"
},
{
"fixed": "10.14.6"
},
{
"introduced": "10.15"
},
{
"fixed": "10.15.7"
}
]
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.14.6-security_update_2019\\-001"
}
]
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.14.6-security_update_2019\\-002"
}
]
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.14.6-security_update_2019\\-004"
}
]
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.14.6-security_update_2019\\-005"
}
]
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.14.6-security_update_2019\\-006"
}
]
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.14.6-security_update_2019\\-007"
}
]
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.14.6-security_update_2020\\-001"
}
]
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.14.6-security_update_2020\\-002"
}
]
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.14.6-security_update_2020\\-003"
}
]
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.14.6-security_update_2020\\-004"
}
]
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.14.6-security_update_2020\\-005"
}
]
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.14.6-security_update_2020\\-006"
}
]
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.14.6-security_update_2020\\-007"
}
]
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.14.6-security_update_2021\\-001"
}
]
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.14.6-security_update_2021\\-002"
}
]
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.14.6-supplemental_update"
}
]
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.14.6-supplemental_update_2"
}
]
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.15.7-NA"
}
]
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.15.7-security_update_2020\\-001"
}
]
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.15.7-security_update_2020\\-005"
}
]
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.15.7-security_update_2020\\-007"
}
]
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.15.7-security_update_2020"
}
]
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.15.7-security_update_2021\\-001"
}
]
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.15.7-supplemental_update"
}
]
},
{
"cpe": "cpe:2.3:o:apple:macos:11.0.1:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "11.0.1"
}
]
},
{
"cpe": "cpe:2.3:o:apple:macos:11.1:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "11.1"
}
]
},
{
"cpe": "cpe:2.3:o:apple:macos:11.2:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "11.2"
}
]
},
{
"cpe": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "10.0"
}
]
},
{
"cpe": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "9.0"
}
]
},
{
"cpe": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "32"
}
]
},
{
"cpe": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "33"
}
]
},
{
"cpe": "cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"fixed": "xcp2410"
},
{
"fixed": "xcp3110"
}
]
},
{
"cpe": "cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"fixed": "xcp2410"
},
{
"fixed": "xcp3110"
}
]
},
{
"cpe": "cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"fixed": "xcp2410"
},
{
"fixed": "xcp3110"
}
]
},
{
"cpe": "cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"fixed": "xcp2410"
},
{
"fixed": "xcp3110"
}
]
},
{
"cpe": "cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"fixed": "xcp2410"
},
{
"fixed": "xcp3110"
}
]
},
{
"cpe": "cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"fixed": "xcp2410"
},
{
"fixed": "xcp3110"
}
]
}
]
}{
"cpe": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "7.73.0"
}
]
}