Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-14524

Опубликовано: 08 янв. 2026
Источник: debian

Описание

When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
curlfixed8.18.0~rc2-1package
curlno-dsatrixiepackage
curlno-dsabookwormpackage
curlpostponedbullseyepackage

Примечания

  • https://curl.se/docs/CVE-2025-14524.html

  • Introduced with: https://github.com/curl/curl/commit/06c1bea72faabb6fad4b7ef818aafaa336c9a7aa (curl-7_33_0)

  • Fixed by: https://github.com/curl/curl/commit/1a822275d333dc6da6043497160fd04c8fa48640 (rc-8_18_0-2, curl-8_18_0)

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 1 месяца назад

When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host.

CVSS3: 5.3
nvd
около 1 месяца назад

When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host.

CVSS3: 5.3
redos
10 дней назад

Уязвимость curl

CVSS3: 5.3
github
около 1 месяца назад

When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host.

suse-cvrf
около 1 месяца назад

Security update for curl