Follow @Openwall on Twitter for new release announcements and other news
[<prev] [day] [month] [year] [list]
Message-ID: <a282ed88-5745-477b-ab63-7fb360cd6ae7@oracle.com>
Date: Wed, 13 May 2026 17:05:42 -0700
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
Subject: [CVE-2026-8328] CPython: FTP PASV SSRF, ftpcp() does
 not use actual peer address, trusts server-supplied PASV host address




-------- Forwarded Message --------
Subject: 	[Security-announce][CVE-2026-8328] FTP PASV SSRF, ftpcp() does not use 
actual peer address, trusts server-supplied PASV host address
Date: 	Wed, 13 May 2026 20:15:52 +0000
From: 	Seth Larson <seth@...hon.org>
Reply-To: 	security-sig@...hon.org
To: 	security-announce@...hon.org



There is a MEDIUM severity vulnerability affecting CPython.

The ftpcp() function in Lib/ftplib.py was not updated when CVE-2021-4189 was 
fixed. While makepasv() was patched to replace server-supplied PASV host 
addresses with the actual peer address (getpeername()[0]), ftpcp() still calls 
parse227() directly and passes the raw attacker-controllable IP address and port 
to target.sendport().

Please see the linked CVE ID for the latest information on affected versions:

* https://www.cve.org/CVERecord?id=CVE-2026-8328
* https://github.com/python/cpython/pull/149648

_______________________________________________
Security-announce mailing list -- security-announce@...hon.org
To unsubscribe send an email to security-announce-leave@...hon.org
https://mail.python.org/mailman3//lists/security-announce.python.org

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.