Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-0037

Опубликовано: 05 мар. 2009
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8

Описание

The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.

РелизСтатусПримечание
dapper

released

7.15.1-1ubuntu3.1
devel

released

7.18.2-8ubuntu4
gutsy

released

7.16.4-2ubuntu1.1
hardy

released

7.18.0-1ubuntu2.1
intrepid

released

7.18.2-1ubuntu4.1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 78%
0.01195
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 16 лет назад

The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.

nvd
больше 16 лет назад

The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.

debian
больше 16 лет назад

The redirect implementation in curl and libcurl 5.11 through 7.19.3, w ...

github
около 3 лет назад

The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.

oracle-oval
больше 16 лет назад

ELSA-2009-0341: curl security update (MODERATE)

EPSS

Процентиль: 78%
0.01195
Низкий

6.8 Medium

CVSS2