CVE-2020-8284

Source
https://cve.org/CVERecord?id=CVE-2020-8284
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-8284.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-8284
Aliases
Downstream
Related
Withdrawn
2026-01-27T04:14:40.667780Z
Published
2020-12-14T20:15:13Z
Modified
2026-01-27T04:14:40.667780Z
Severity
  • 3.7 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.

References

Affected packages