Home

Description

basic-ftp is an FTP client for Node.js. Prior to 5.3.1, basic-ftp is vulnerable to client-side denial of service when parsing FTP control-channel multiline responses. A malicious or compromised FTP server can send an unterminated multiline response during the initial FTP banner phase, before authentication. The client keeps appending attacker-controlled data into FtpContext._partialResponse and repeatedly reparses the accumulated buffer without enforcing a maximum control response size. As a result, an application using basic-ftp can remain stuck in connect() while memory and CPU usage grow under attacker-controlled input. This can lead to process-level denial of service, container OOM kills, worker restarts, queue backlog, or service degradation in applications that automatically connect to FTP endpoints. This vulnerability is fixed in 5.3.1.

PUBLISHED Reserved 2026-05-05 | Published 2026-05-12 | Updated 2026-05-14 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-400: Uncontrolled Resource Consumption

CWE-770: Allocation of Resources Without Limits or Throttling

Product status

< 5.3.1
affected

References

github.com/...ic-ftp/security/advisories/GHSA-rpmf-866q-6p89 exploit

github.com/...ic-ftp/security/advisories/GHSA-rpmf-866q-6p89

cve.org (CVE-2026-44240)

nvd.nist.gov (CVE-2026-44240)

Download JSON