pyftpdlib before 0.1.1 does not choose a random value for the port associated with the PASV command, which makes it easier for remote attackers to obtain potentially sensitive information about the number of in-progress data connections by reading the response to this command.
{
"github_reviewed": true,
"nvd_published_at": "2010-10-19T20:00:00Z",
"cwe_ids": [
"CWE-330"
],
"github_reviewed_at": "2024-04-29T14:38:49Z",
"severity": "HIGH"
}