Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-9086

Опубликовано: 12 сент. 2025
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

  1. A cookie is set using the secure keyword for https://target
  2. curl is redirected to or otherwise made to speak with http://target (same hostname, but using clear text HTTP) using the same cookie set
  3. The same cookie name is set - but with just a slash as path (path='/'). Since this site is not secure, the cookie should just be ignored.
  4. A bug in the path comparison logic makes curl read outside a heap buffer boundary The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path. The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10curlFix deferred
Red Hat Enterprise Linux 6curlFix deferred
Red Hat Enterprise Linux 7curlFix deferred
Red Hat Enterprise Linux 8curlFix deferred
Red Hat Enterprise Linux 9curlFix deferred
Red Hat JBoss Core ServicescurlFix deferred
Red Hat OpenShift Container Platform 4rhcosFix deferred
Red Hat OpenShift Dev Spacesdevspaces/code-rhel9Fix deferred
Red Hat OpenShift Dev Spacesdevspaces-tech-preview/idea-rhel9Fix deferred
Red Hat Trusted Profile Analyzerrhtpa/rhtpa-trustification-service-rhel9Fix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=2394750curl: libcurl: Curl out of bounds read for cookie path

EPSS

Процентиль: 27%
0.00095
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
3 месяца назад

1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but with just a slash as path (`path='/'`). Since this site is not secure, the cookie *should* just be ignored. 4. A bug in the path comparison logic makes curl read outside a heap buffer boundary The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path. The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.

CVSS3: 7.5
nvd
3 месяца назад

1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but with just a slash as path (`path='/'`). Since this site is not secure, the cookie *should* just be ignored. 4. A bug in the path comparison logic makes curl read outside a heap buffer boundary The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path. The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.

msrc
3 месяца назад

Out of bounds read for cookie path

CVSS3: 7.5
debian
3 месяца назад

1. A cookie is set using the `secure` keyword for `https://target` 2. ...

CVSS3: 7.5
redos
около 2 месяцев назад

Уязвимость curl

EPSS

Процентиль: 27%
0.00095
Низкий

5.3 Medium

CVSS3