A flaw was found in the FTP GVfs backend. A remote attacker could exploit this input validation vulnerability by supplying specially crafted file paths containing carriage return and line feed (CRLF) sequences. These unsanitized sequences allow the attacker to terminate intended FTP commands and inject arbitrary FTP commands, potentially leading to arbitrary code execution or other severe impacts.
Metrics
Affected Vendors & Products
References
History
Thu, 26 Feb 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in the FTP GVfs backend. A remote attacker could exploit this input validation vulnerability by supplying specially crafted file paths containing carriage return and line feed (CRLF) sequences. These unsanitized sequences allow the attacker to terminate intended FTP commands and inject arbitrary FTP commands, potentially leading to arbitrary code execution or other severe impacts. | |
| Title | Gvfs: ftp gvfs backend: arbitrary ftp command injection via crlf sequences in file paths | |
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| Weaknesses | CWE-93 | |
| CPEs | cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-02-26T15:10:47.917Z
Reserved: 2026-02-26T13:34:41.532Z
Link: CVE-2026-28296
No data.
Status : Received
Published: 2026-02-26T16:24:09.580
Modified: 2026-02-26T16:24:09.580
Link: CVE-2026-28296
No data.
OpenCVE Enrichment
No data.