First published: Tue Dec 21 2021(Updated: )
A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python3 | <0:3.6.8-45.el8 | 0:3.6.8-45.el8 |
redhat/rh-python38-babel | <0:2.7.0-12.el7 | 0:2.7.0-12.el7 |
redhat/rh-python38-python | <0:3.8.11-2.el7 | 0:3.8.11-2.el7 |
redhat/rh-python38-python-cryptography | <0:2.8-5.el7 | 0:2.8-5.el7 |
redhat/rh-python38-python-jinja2 | <0:2.10.3-6.el7 | 0:2.10.3-6.el7 |
redhat/rh-python38-python-lxml | <0:4.4.1-7.el7 | 0:4.4.1-7.el7 |
redhat/rh-python38-python-pip | <0:19.3.1-2.el7 | 0:19.3.1-2.el7 |
redhat/rh-python38-python-urllib3 | <0:1.25.7-7.el7 | 0:1.25.7-7.el7 |
redhat/python27-python | <0:2.7.18-4.el7 | 0:2.7.18-4.el7 |
Python Python | >=3.6.0<3.6.14 | |
Python Python | >=3.7.0<3.7.11 | |
Python Python | >=3.8.0<3.8.9 | |
Python Python | >=3.9.0<3.9.3 | |
Python Python | =3.10.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Redhat Software Collections | ||
Redhat Enterprise Linux | =8.0 | |
NetApp ONTAP Select Deploy administration utility | ||
redhat/python | <3.6.14 | 3.6.14 |
redhat/python | <3.7.11 | 3.7.11 |
redhat/python | <3.8.9 | 3.8.9 |
redhat/python | <3.9.3 | 3.9.3 |
redhat/python | <3.10.0 | 3.10.0 |
IBM Cloud Pak for Security | <=1.10.0.0 - 1.10.11.0 | |
IBM QRadar Suite Software | <=1.10.12.0 - 1.10.16.0 | |
debian/pypy3 | <=7.3.5+dfsg-2+deb11u2<=7.3.5+dfsg-2+deb11u3 | 7.3.11+dfsg-2+deb12u2 7.3.17+dfsg-2 |
debian/python2.7 | <=2.7.18-8+deb11u1 | |
debian/python3.9 | <=3.9.2-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-4189 is a vulnerability found in Python's FTP (File Transfer Protocol) client library in PASV (passive) mode.
The vulnerability in CVE-2021-4189 allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting to it.
The severity level of CVE-2021-4189 is medium, with a CVSS score of 5.3.
The versions affected by CVE-2021-4189 are Python 3.6.14, Python 3.7.11, Python 3.8.9, Python 3.9.3, and Python 3.10.0.
To fix the vulnerability in Python identified as CVE-2021-4189, you should update to Python versions 3.6.14, 3.7.11, 3.8.9, 3.9.3, or 3.10.0, depending on the version you are currently using.