Prior to Apache Commons Net 3.9.0, Net’s FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.
More Stories
ruby-3.3.8-19.fc41
FEDORA-2025-60513bdbbd Packages in this update: ruby-3.3.8-19.fc41 Update description: Upgrade to Ruby 3.3.8. CVE-2025-25186: Fix Net::IMAP vulnerable to possible DoS by...
dnf-4.23.0-1.fc40.1
FEDORA-2025-21c36b3aa5 Packages in this update: dnf-4.23.0-1.fc40.1 Update description: This releases preserves enablement state of dnf-automatic.timer when upgrading to Fedora 41....
podman-tui-1.5.0-2.el9
FEDORA-EPEL-2025-7c57e75cbc Packages in this update: podman-tui-1.5.0-2.el9 Update description: release v1.5.0 Read More
prometheus-podman-exporter-1.16.0-1.fc42
FEDORA-2025-12ac4e9cfd Packages in this update: prometheus-podman-exporter-1.16.0-1.fc42 Update description: release v1.16.0 Read More
prometheus-podman-exporter-1.16.0-1.fc41
FEDORA-2025-b0915f0a19 Packages in this update: prometheus-podman-exporter-1.16.0-1.fc41 Update description: release v1.16.0 Read More
prometheus-podman-exporter-1.16.0-1.el9
FEDORA-EPEL-2025-6653a27cfd Packages in this update: prometheus-podman-exporter-1.16.0-1.el9 Update description: release 1.16.0 Read More