Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-28322

Опубликовано: 26 мая 2023
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS3: 3.7

Описание

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (CURLOPT_READFUNCTION) to ask for data to send, even when the CURLOPT_POSTFIELDS option has been set, if the same handle previously wasused to issue a PUT request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

released

7.88.1-10ubuntu1
esm-infra-legacy/trusty

not-affected

7.35.0-1ubuntu2.20+esm16
esm-infra/bionic

released

7.58.0-2ubuntu3.24+esm1
esm-infra/focal

not-affected

7.68.0-1ubuntu2.19
esm-infra/xenial

released

7.47.0-1ubuntu2.19+esm9
focal

released

7.68.0-1ubuntu2.19
jammy

released

7.81.0-1ubuntu1.11
kinetic

released

7.85.0-1ubuntu0.6
lunar

released

7.88.1-8ubuntu2.1

Показывать по

EPSS

Процентиль: 66%
0.00516
Низкий

3.7 Low

CVSS3

Связанные уязвимости

CVSS3: 3.7
redhat
около 2 лет назад

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
nvd
около 2 лет назад

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
msrc
около 2 лет назад

Описание отсутствует

CVSS3: 3.7
debian
около 2 лет назад

An information disclosure vulnerability exists in curl <v8.1.0 when do ...

CVSS3: 3.7
github
около 2 лет назад

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

EPSS

Процентиль: 66%
0.00516
Низкий

3.7 Low

CVSS3

Уязвимость CVE-2023-28322