Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-28322

Опубликовано: 17 мая 2023
Источник: redhat
CVSS3: 3.7
EPSS Низкий

Описание

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (CURLOPT_READFUNCTION) to ask for data to send, even when the CURLOPT_POSTFIELDS option has been set, if the same handle previously wasused to issue a PUT request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

A use-after-free flaw was found in the Curl package. This issue may lead to unintended information disclosure by the application.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
.NET Core 3.1 on Red Hat Enterprise Linuxrh-dotnet31-curlOut of support scope
Red Hat Enterprise Linux 6curlOut of support scope
Red Hat Enterprise Linux 7curlFix deferred
JBoss Core Services for RHEL 8jbcs-httpd24-curlFixedRHSA-2023:462915.08.2023
JBoss Core Services on RHEL 7jbcs-httpd24-curlFixedRHSA-2023:462915.08.2023
Red Hat Enterprise Linux 8curlFixedRHSA-2024:160102.04.2024
Red Hat Enterprise Linux 8.6 Extended Update SupportcurlFixedRHSA-2024:042825.01.2024
Red Hat Enterprise Linux 8.8 Extended Update SupportcurlFixedRHSA-2024:058530.01.2024
Red Hat Enterprise Linux 9curlFixedRHSA-2023:435401.08.2023
Red Hat Enterprise Linux 9curlFixedRHSA-2023:435401.08.2023

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-440
https://bugzilla.redhat.com/show_bug.cgi?id=2196793curl: more POST-after-PUT confusion

EPSS

Процентиль: 66%
0.00516
Низкий

3.7 Low

CVSS3

Связанные уязвимости

CVSS3: 3.7
ubuntu
около 2 лет назад

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
nvd
около 2 лет назад

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
msrc
около 2 лет назад

Описание отсутствует

CVSS3: 3.7
debian
около 2 лет назад

An information disclosure vulnerability exists in curl <v8.1.0 when do ...

CVSS3: 3.7
github
около 2 лет назад

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

EPSS

Процентиль: 66%
0.00516
Низкий

3.7 Low

CVSS3