Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-8177

Опубликовано: 24 июн. 2020
Источник: redhat
CVSS3: 5.4
EPSS Низкий

Описание

curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.

A flaw was found in curl. Overwriting local files is possible when using a certain combination of command line options. Requesting content from a malicious server could lead to overwriting local files with compromised files leading to unknown effects. The highest threat from this vulnerability is to file integrity.

Отчет

This issue only affects the 'curl' command line utility. Additionally, this is only an issue when using the '-J' (with the '-O' option) and '-i' command line options combined. In most cases, there is nothing to gain for a local attacker here: the curl command line utility is likely running with the same privileges as the user, and thus the user can already overwrite all the files curl could overwrite. However, a local user will have to call curl with the '-J' and '-i' command line options while requesting content from a malicious server, which then opens up an opportunity for the malicious server to overwrite local files.

Меры по смягчению последствий

The vulnerability is only possible when using the '-J' and '-i' switches in conjunction with the curl command. Executing curl without these switches mitigates the flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
.NET Core 2.1 on Red Hat Enterprise Linuxrh-dotnet21-curlNot affected
.NET Core 3.1 on Red Hat Enterprise Linuxrh-dotnet31-curlNot affected
Red Hat Ceph Storage 2curlOut of support scope
Red Hat Enterprise Linux 5curlNot affected
Red Hat Enterprise Linux 6curlNot affected
Red Hat JBoss Core Servicesjbcs-httpd24-curlNot affected
Red Hat Software Collectionshttpd24-curlWill not fix
Red Hat Enterprise Linux 7curlFixedRHSA-2020:500210.11.2020
Red Hat Enterprise Linux 8curlFixedRHSA-2020:459904.11.2020
Red Hat Enterprise Linux 8.2 Extended Update SupportcurlFixedRHSA-2020:541715.12.2020

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1847915curl: Incorrect argument check can allow remote servers to overwrite local files

EPSS

Процентиль: 5%
0.00021
Низкий

5.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 5 лет назад

curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.

CVSS3: 7.8
nvd
около 5 лет назад

curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.

CVSS3: 7.8
msrc
около 5 лет назад

curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.

CVSS3: 7.8
debian
около 5 лет назад

curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of na ...

suse-cvrf
больше 5 лет назад

Security update for curl

EPSS

Процентиль: 5%
0.00021
Низкий

5.4 Medium

CVSS3