Bug 1260921 - wget: IP address exposure via FTP PORT command
Summary: wget: IP address exposure via FTP PORT command
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1260925
Blocks: 1260924
TreeView+ depends on / blocked
 
Reported: 2015-09-08 08:44 UTC by Adam Mariš
Modified: 2019-09-29 13:36 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2015-09-16 12:59:18 UTC
Embargoed:


Attachments (Terms of Use)

Description Adam Mariš 2015-09-08 08:44:44 UTC
User's IP address is exposed to the FTP server when automatically falling back from passive mode to active mode using PORT command. Wget is using normally passive mode, but this situation occurs when server rejects the PASV command. The real IP address is exposed even if client uses proxy server. Affected versions are <= 1.16.3.

CVE request:

http://seclists.org/oss-sec/2015/q3/516

Upstream patch:

http://git.savannah.gnu.org/cgit/wget.git/commit/?id=075d7556964f5a871a73c22ac4b69f5361295099

Comment 1 Adam Mariš 2015-09-08 08:52:03 UTC
Created wget tracking bugs for this issue:

Affects: fedora-all [bug 1260925]

Comment 4 Adam Mariš 2015-11-02 13:23:07 UTC
CVE-2015-7665 was assigned to this vulnerability for Tails. This vulnerability in upstream wget distribution is not considered as vulnerability, thus there's no CVE assigned for upstream wget.

http://seclists.org/oss-sec/2015/q4/8


Note You need to log in before you can comment on or make changes to this bug.