Bug 1260921
Summary: | wget: IP address exposure via FTP PORT command | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | micah, thozza |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
It was discovered that wget could disclose a user's IP address in an FTP session. If the FTP server does not offer support for the passive FTP mode, wget would automatically fall back to the active FTP mode, which could expose the client's IP address as part of the "PORT" command, even if wget was used in combination with an anonymizing proxy.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2015-09-16 12:59:18 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1260925 | ||
Bug Blocks: | 1260924 |
Description
Adam Mariš
2015-09-08 08:44:44 UTC
Created wget tracking bugs for this issue: Affects: fedora-all [bug 1260925] CVE-2015-7665 was assigned to this vulnerability for Tails. This vulnerability in upstream wget distribution is not considered as vulnerability, thus there's no CVE assigned for upstream wget. http://seclists.org/oss-sec/2015/q4/8 |