Bug 1260921

Summary: wget: IP address exposure via FTP PORT command
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: micah, thozza
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
It was discovered that wget could disclose a user's IP address in an FTP session. If the FTP server does not offer support for the passive FTP mode, wget would automatically fall back to the active FTP mode, which could expose the client's IP address as part of the "PORT" command, even if wget was used in combination with an anonymizing proxy.
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-09-16 12:59:18 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1260925    
Bug Blocks: 1260924    

Description Adam Mariš 2015-09-08 08:44:44 UTC
User's IP address is exposed to the FTP server when automatically falling back from passive mode to active mode using PORT command. Wget is using normally passive mode, but this situation occurs when server rejects the PASV command. The real IP address is exposed even if client uses proxy server. Affected versions are <= 1.16.3.

CVE request:

http://seclists.org/oss-sec/2015/q3/516

Upstream patch:

http://git.savannah.gnu.org/cgit/wget.git/commit/?id=075d7556964f5a871a73c22ac4b69f5361295099

Comment 1 Adam Mariš 2015-09-08 08:52:03 UTC
Created wget tracking bugs for this issue:

Affects: fedora-all [bug 1260925]

Comment 4 Adam Mariš 2015-11-02 13:23:07 UTC
CVE-2015-7665 was assigned to this vulnerability for Tails. This vulnerability in upstream wget distribution is not considered as vulnerability, thus there's no CVE assigned for upstream wget.

http://seclists.org/oss-sec/2015/q4/8