CVE-2020-8284Sensitive Information Exposure in Siemens Sinec Infrastructure Network Services

Severity
3.7LOWNVD
EPSS
0.1%
top 71.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 14
Latest updateMay 24

Description

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 2.2 | Impact: 1.4

Affected Packages18 packages

Debianhaxx/curl< 7.74.0-1+3
Ubuntuhaxx/curl< 7.35.0-1ubuntu2.20+esm6
NVDhaxx/curl7.73.0
CVEListV5https/github.com_curl_curl7.73.0 and earlier

Also affects: Debian Linux 10.0, 9.0, Fedora 32, 33

Patches

🔴Vulnerability Details

5
GHSA
GHSA-69rc-qfx4-h683: A malicious server can use the FTP PASV response to trick curl 72022-05-24
CVEList
CVE-2020-8284: A malicious server can use the FTP PASV response to trick curl 72020-12-14
OSV
CVE-2020-8284: A malicious server can use the FTP PASV response to trick curl 72020-12-14
OSV
curl vulnerabilities2020-12-09
OSV
curl vulnerabilities2020-12-09

📋Vendor Advisories

7
Apple
CVE-2020-8284: macOS Big Sur 11.32021-04-26
Apple
CVE-2020-8284: Security Update 2021-002 Catalina2021-04-26
Ubuntu
curl vulnerabilities2020-12-09
Ubuntu
curl vulnerabilities2020-12-09
Red Hat
curl: FTP PASV command response can cause curl to connect to arbitrary host2020-12-09

💬Community

1
HackerOne
CVE-2020-8284: trusting FTP PASV responses2021-02-09
CVE-2020-8284 — Sensitive Information Exposure | cvebase