Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-46218

Опубликовано: 06 дек. 2023
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

This flaw allows a malicious HTTP server to set "super cookies" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl's function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with domain=co.UK when the URL used a lower case hostname curl.co.uk, even though co.uk is listed as a PSL domain.

A flaw was found in curl that verifies a given cookie domain against the Public Suffix List. This issue could allow a malicious HTTP server to set "super cookies" in curl that are passed back to more origins than what is otherwise allowed or possible.

Отчет

When curl is built without PSL support, it cannot protect against this problem but it is expected to not allow "too wide" cookies when PSL support is enabled.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6curlNot affected
Red Hat Enterprise Linux 7curlNot affected
Red Hat Satellite 6puppet-agentAffected
JBoss Core Services for RHEL 8jbcs-httpd24-curlFixedRHSA-2024:131618.03.2024
JBoss Core Services on RHEL 7jbcs-httpd24-curlFixedRHSA-2024:131618.03.2024
Red Hat Enterprise Linux 8curlFixedRHSA-2024:160102.04.2024
Red Hat Enterprise Linux 8.6 Extended Update SupportcurlFixedRHSA-2024:042825.01.2024
Red Hat Enterprise Linux 8.8 Extended Update SupportcurlFixedRHSA-2024:058530.01.2024
Red Hat Enterprise Linux 9curlFixedRHSA-2024:112905.03.2024
Red Hat Enterprise Linux 9curlFixedRHSA-2024:112905.03.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-201
https://bugzilla.redhat.com/show_bug.cgi?id=2252030curl: information disclosure by exploiting a mixed case flaw

EPSS

Процентиль: 56%
0.00337
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 1 года назад

This flaw allows a malicious HTTP server to set "super cookies" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl's function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.

CVSS3: 6.5
nvd
больше 1 года назад

This flaw allows a malicious HTTP server to set "super cookies" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl's function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.

CVSS3: 6.5
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 6.5
debian
больше 1 года назад

This flaw allows a malicious HTTP server to set "super cookies" in cur ...

CVSS3: 6.5
redos
около 1 года назад

Уязвимость curl

EPSS

Процентиль: 56%
0.00337
Низкий

5.3 Medium

CVSS3