Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-27534

Опубликовано: 20 мар. 2023
Источник: redhat
CVSS3: 3.7
EPSS Низкий

Описание

A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.

Отчет

In a containerized environment running SELinux in enforcing mode, such as Red Hat OpenShift Container Platform, this vulnerability does not allow an attacker to escape the boundary of a container. In this case no additional access is gained, there is an additional (but more complicated step) to look at files the user already has access to. The upstream project (Curl) also rated this CVE as Low, see link in External References. It is unlikely that Red Hat offerings are utilizing the SFTP feature of Curl, so the opportunity to exploit it may not exist. For those reasons Red Hat Product Security rates the impact as Low.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
.NET Core 3.1 on Red Hat Enterprise Linuxrh-dotnet31-curlOut of support scope
Red Hat Enterprise Linux 6curlOut of support scope
Red Hat Enterprise Linux 7curlFix deferred
Red Hat Enterprise Linux 8curlFix deferred
JBCS httpd 2.4.51.sp2curlFixedRHSA-2023:335505.06.2023
JBoss Core Services for RHEL 8jbcs-httpd24-curlFixedRHSA-2023:335405.06.2023
JBoss Core Services on RHEL 7jbcs-httpd24-curlFixedRHSA-2023:335405.06.2023
Red Hat Enterprise Linux 9curlFixedRHSA-2023:667907.11.2023
Red Hat Enterprise Linux 9curlFixedRHSA-2023:667907.11.2023

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=2179069curl: SFTP path ~ resolving discrepancy

EPSS

Процентиль: 27%
0.00092
Низкий

3.7 Low

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 2 лет назад

A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.

CVSS3: 8.8
nvd
около 2 лет назад

A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.

CVSS3: 8.8
msrc
около 2 лет назад

Описание отсутствует

CVSS3: 8.8
debian
около 2 лет назад

A path traversal vulnerability exists in curl <8.0.0 SFTP implementati ...

CVSS3: 8.8
github
около 2 лет назад

A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.

EPSS

Процентиль: 27%
0.00092
Низкий

3.7 Low

CVSS3

Уязвимость CVE-2023-27534