CVE-2026-8328
Public on 2026-05-13
Modified on 2026-05-15
Description
The ftpcp() function in Lib/ftplib.py was not updated when
CVE-2021-4189 was fixed. While makepasv() was patched to replace
server-supplied PASV host addresses with the actual peer address
(getpeername()[0]), ftpcp() still calls parse227() directly and passes
the raw attacker-controllable IP address and port to target.sendport(). This patch is related to CVE-2021-4189.
CVE-2021-4189 was fixed. While makepasv() was patched to replace
server-supplied PASV host addresses with the actual peer address
(getpeername()[0]), ftpcp() still calls parse227() directly and passes
the raw attacker-controllable IP address and port to target.sendport(). This patch is related to CVE-2021-4189.
Severity
See what this means
CVSS v3 Base Score
See breakdown
Affected Packages
| Platform | Package | Release Date | Advisory | Status |
|---|---|---|---|---|
| Amazon Linux 2 - Core | python | Pending Fix | ||
| Amazon Linux 2 - Core | python3 | Pending Fix | ||
| Amazon Linux 2023 | python3.11 | Pending Fix | ||
| Amazon Linux 2023 | python3.12 | Pending Fix | ||
| Amazon Linux 2023 | python3.13 | Pending Fix | ||
| Amazon Linux 2023 | python3.14 | Pending Fix | ||
| Amazon Linux 2023 | python3.9 | Pending Fix |
CVSS Scores
| Score Type | Score | Vector | |
|---|---|---|---|
| Amazon Linux | CVSSv3 | 5.4 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N |