CVE-2020-8284

Source
https://cve.org/CVERecord?id=CVE-2020-8284
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-8284.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-8284
Aliases
Downstream
Related
Published
2020-12-14T20:15:13.903Z
Modified
2026-05-15T12:03:45.812346455Z
Severity
  • 3.7 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.

Database specific
{
    "unresolved_ranges": [
        {
            "cpes": [
                "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*",
                "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*",
                "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*",
                "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*",
                "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*",
                "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*",
                "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
                "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
                "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
                "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
                "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
                "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
                "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*",
                "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*",
                "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*",
                "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*",
                "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*",
                "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
                "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
                "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*",
                "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*",
                "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*",
                "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
                "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*"
            ],
            "source": "CPE_FIELD",
            "vendor_product": "apple:mac_os_x",
            "extracted_events": [
                {
                    "introduced": "10.14.0"
                },
                {
                    "fixed": "10.14.6"
                },
                {
                    "introduced": "10.15"
                },
                {
                    "fixed": "10.15.7"
                },
                {
                    "last_affected": "10.14.6-security_update_2019\\-001"
                },
                {
                    "last_affected": "10.14.6-security_update_2019\\-002"
                },
                {
                    "last_affected": "10.14.6-security_update_2019\\-004"
                },
                {
                    "last_affected": "10.14.6-security_update_2019\\-005"
                },
                {
                    "last_affected": "10.14.6-security_update_2019\\-006"
                },
                {
                    "last_affected": "10.14.6-security_update_2019\\-007"
                },
                {
                    "last_affected": "10.14.6-security_update_2020\\-001"
                },
                {
                    "last_affected": "10.14.6-security_update_2020\\-002"
                },
                {
                    "last_affected": "10.14.6-security_update_2020\\-003"
                },
                {
                    "last_affected": "10.14.6-security_update_2020\\-004"
                },
                {
                    "last_affected": "10.14.6-security_update_2020\\-005"
                },
                {
                    "last_affected": "10.14.6-security_update_2020\\-006"
                },
                {
                    "last_affected": "10.14.6-security_update_2020\\-007"
                },
                {
                    "last_affected": "10.14.6-security_update_2021\\-001"
                },
                {
                    "last_affected": "10.14.6-security_update_2021\\-002"
                },
                {
                    "last_affected": "10.14.6-supplemental_update"
                },
                {
                    "last_affected": "10.14.6-supplemental_update_2"
                },
                {
                    "last_affected": "10.15.7-NA"
                },
                {
                    "last_affected": "10.15.7-security_update_2020"
                },
                {
                    "last_affected": "10.15.7-security_update_2020\\-001"
                },
                {
                    "last_affected": "10.15.7-security_update_2020\\-005"
                },
                {
                    "last_affected": "10.15.7-security_update_2020\\-007"
                },
                {
                    "last_affected": "10.15.7-security_update_2021\\-001"
                },
                {
                    "last_affected": "10.15.7-supplemental_update"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:o:apple:macos:11.0.1:*:*:*:*:*:*:*",
                "cpe:2.3:o:apple:macos:11.1:*:*:*:*:*:*:*",
                "cpe:2.3:o:apple:macos:11.2:*:*:*:*:*:*:*"
            ],
            "vendor_product": "apple:macos",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "11.0.1"
                },
                {
                    "last_affected": "11.1"
                },
                {
                    "last_affected": "11.2"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
            ],
            "source": "CPE_FIELD",
            "vendor_product": "debian:debian_linux",
            "extracted_events": [
                {
                    "last_affected": "9.0"
                },
                {
                    "last_affected": "10.0"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"
            ],
            "source": "CPE_FIELD",
            "vendor_product": "fedoraproject:fedora",
            "extracted_events": [
                {
                    "last_affected": "32"
                },
                {
                    "last_affected": "33"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*"
            ],
            "source": "CPE_FIELD",
            "vendor_product": "fujitsu:m10-1_firmware",
            "extracted_events": [
                {
                    "fixed": "xcp2410"
                },
                {
                    "fixed": "xcp3110"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*"
            ],
            "source": "CPE_FIELD",
            "vendor_product": "fujitsu:m10-4_firmware",
            "extracted_events": [
                {
                    "fixed": "xcp2410"
                },
                {
                    "fixed": "xcp3110"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*"
            ],
            "source": "CPE_FIELD",
            "vendor_product": "fujitsu:m10-4s_firmware",
            "extracted_events": [
                {
                    "fixed": "xcp2410"
                },
                {
                    "fixed": "xcp3110"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*"
            ],
            "vendor_product": "fujitsu:m12-1_firmware",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "fixed": "xcp2410"
                },
                {
                    "fixed": "xcp3110"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*"
            ],
            "source": "CPE_FIELD",
            "vendor_product": "fujitsu:m12-2_firmware",
            "extracted_events": [
                {
                    "fixed": "xcp2410"
                },
                {
                    "fixed": "xcp3110"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*"
            ],
            "source": "CPE_FIELD",
            "vendor_product": "fujitsu:m12-2s_firmware",
            "extracted_events": [
                {
                    "fixed": "xcp2410"
                },
                {
                    "fixed": "xcp3110"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*"
            ],
            "source": "CPE_FIELD",
            "vendor_product": "oracle:communications_billing_and_revenue_management",
            "extracted_events": [
                {
                    "last_affected": "12.0.0.3.0"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*"
            ],
            "source": "CPE_FIELD",
            "vendor_product": "oracle:communications_cloud_native_core_policy",
            "extracted_events": [
                {
                    "last_affected": "1.14.0"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:a:oracle:essbase:21.2:*:*:*:*:*:*:*"
            ],
            "vendor_product": "oracle:essbase",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "21.2"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*"
            ],
            "vendor_product": "oracle:peoplesoft_enterprise_peopletools",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "8.58"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*"
            ],
            "source": "CPE_FIELD",
            "vendor_product": "siemens:sinec_infrastructure_network_services",
            "extracted_events": [
                {
                    "fixed": "1.0.1.1"
                }
            ]
        },
        {
            "cpes": [
                "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*",
                "cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*"
            ],
            "source": "CPE_FIELD",
            "vendor_product": "splunk:universal_forwarder",
            "extracted_events": [
                {
                    "introduced": "8.2.0"
                },
                {
                    "fixed": "8.2.12"
                },
                {
                    "introduced": "9.0.0"
                },
                {
                    "fixed": "9.0.6"
                },
                {
                    "last_affected": "9.1.0"
                }
            ]
        }
    ]
}
References

Affected packages