Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-2004

Опубликовано: 27 мар. 2024
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to curl.se with a plaintext protocol which has been explicitly disabled. curl --proto -all,-http http://curl.se The flaw is only present if the set of selected protocols disables the entire set of available protocols, in itself a command with no practical use and therefore unlikely to be encountered in real situations. The curl security team has thus assessed this to be low severity bug.

A flaw was found in curl. When a protocol selection parameter disables all protocols without adding any, the default set of protocols remains in the allowed set due to a logic error, allowing usage of disabled protocols.

Отчет

The curl package as shipped in Red Hat Enterprise Linux 6, 7, 8, 9, and RHSCL is not affected by this vulnerability because the vulnerable code was introduced in a newer version of curl.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10curlNot affected
Red Hat Enterprise Linux 6curlNot affected
Red Hat Enterprise Linux 7curlNot affected
Red Hat Enterprise Linux 8curlNot affected
Red Hat Enterprise Linux 9curlNot affected
Red Hat Software Collectionshttpd24-curlNot affected
JBoss Core Services for RHEL 8jbcs-httpd24-curlFixedRHSA-2024:269307.05.2024
JBoss Core Services for RHEL 8jbcs-httpd24-httpdFixedRHSA-2024:269307.05.2024
JBoss Core Services for RHEL 8jbcs-httpd24-mod_http2FixedRHSA-2024:269307.05.2024
JBoss Core Services for RHEL 8jbcs-httpd24-mod_jkFixedRHSA-2024:269307.05.2024

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-115

EPSS

Процентиль: 68%
0.00601
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 3.5
ubuntu
около 1 года назад

When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to curl.se with a plaintext protocol which has been explicitly disabled. curl --proto -all,-http http://curl.se The flaw is only present if the set of selected protocols disables the entire set of available protocols, in itself a command with no practical use and therefore unlikely to be encountered in real situations. The curl security team has thus assessed this to be low severity bug.

CVSS3: 3.5
nvd
около 1 года назад

When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to curl.se with a plaintext protocol which has been explicitly disabled. curl --proto -all,-http http://curl.se The flaw is only present if the set of selected protocols disables the entire set of available protocols, in itself a command with no practical use and therefore unlikely to be encountered in real situations. The curl security team has thus assessed this to be low severity bug.

CVSS3: 3.5
msrc
9 месяцев назад

Описание отсутствует

CVSS3: 3.5
debian
около 1 года назад

When a protocol selection parameter option disables all protocols with ...

CVSS3: 3.5
github
около 1 года назад

When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to curl.se with a plaintext protocol which has been explicitly disabled. curl --proto -all,-http http://curl.se The flaw is only present if the set of selected protocols disables the entire set of available protocols, in itself a command with no practical use and therefore unlikely to be encountered in real situations. The curl security team has thus assessed this to be low severity bug.

EPSS

Процентиль: 68%
0.00601
Низкий

5.3 Medium

CVSS3