CVE-2021-4189

Source
https://cve.org/CVERecord?id=CVE-2021-4189
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-4189.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-4189
Aliases
Downstream
Related
Published
2022-08-24T16:15:09.827Z
Modified
2026-02-06T22:12:30.659481Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

References

Affected packages

Git / github.com/python/cpython

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-4189.json"