Логотип exploitDog
bind: "CVE-2023-38546"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-38546"

Количество 16

Количество 16

ubuntu логотип

CVE-2023-38546

около 2 лет назад

This flaw allows an attacker to insert cookies at will into a running program using libcurl, if the specific series of conditions are met. libcurl performs transfers. In its API, an application creates "easy handles" that are the individual handles for single transfers. libcurl provides a function call that duplicates en easy handle called [curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html). If a transfer has cookies enabled when the handle is duplicated, the cookie-enable state is also cloned - but without cloning the actual cookies. If the source handle did not read any cookies from a specific file on disk, the cloned version of the handle would instead store the file name as `none` (using the four ASCII letters, no quotes). Subsequent use of the cloned handle that does not explicitly set a source to load cookies from would then inadvertently load cookies from a file named `none` - if such a file exists and is readable in the current directory of the program ...

CVSS3: 3.7
EPSS: Низкий
redhat логотип

CVE-2023-38546

около 2 лет назад

This flaw allows an attacker to insert cookies at will into a running program using libcurl, if the specific series of conditions are met. libcurl performs transfers. In its API, an application creates "easy handles" that are the individual handles for single transfers. libcurl provides a function call that duplicates en easy handle called [curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html). If a transfer has cookies enabled when the handle is duplicated, the cookie-enable state is also cloned - but without cloning the actual cookies. If the source handle did not read any cookies from a specific file on disk, the cloned version of the handle would instead store the file name as `none` (using the four ASCII letters, no quotes). Subsequent use of the cloned handle that does not explicitly set a source to load cookies from would then inadvertently load cookies from a file named `none` - if such a file exists and is readable in the current directory of the program ...

CVSS3: 3.7
EPSS: Низкий
nvd логотип

CVE-2023-38546

около 2 лет назад

This flaw allows an attacker to insert cookies at will into a running program using libcurl, if the specific series of conditions are met. libcurl performs transfers. In its API, an application creates "easy handles" that are the individual handles for single transfers. libcurl provides a function call that duplicates en easy handle called [curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html). If a transfer has cookies enabled when the handle is duplicated, the cookie-enable state is also cloned - but without cloning the actual cookies. If the source handle did not read any cookies from a specific file on disk, the cloned version of the handle would instead store the file name as `none` (using the four ASCII letters, no quotes). Subsequent use of the cloned handle that does not explicitly set a source to load cookies from would then inadvertently load cookies from a file named `none` - if such a file exists and is readable in the current directory of the program

CVSS3: 3.7
EPSS: Низкий
msrc логотип

CVE-2023-38546

около 2 лет назад

CVSS3: 3.7
EPSS: Низкий
debian логотип

CVE-2023-38546

около 2 лет назад

This flaw allows an attacker to insert cookies at will into a running ...

CVSS3: 3.7
EPSS: Низкий
github логотип

GHSA-x3qx-m3c2-qfhx

около 2 лет назад

This flaw allows an attacker to insert cookies at will into a running program using libcurl, if the specific series of conditions are met. libcurl performs transfers. In its API, an application creates "easy handles" that are the individual handles for single transfers. libcurl provides a function call that duplicates en easy handle called [curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html). If a transfer has cookies enabled when the handle is duplicated, the cookie-enable state is also cloned - but without cloning the actual cookies. If the source handle did not read any cookies from a specific file on disk, the cloned version of the handle would instead store the file name as `none` (using the four ASCII letters, no quotes). Subsequent use of the cloned handle that does not explicitly set a source to load cookies from would then inadvertently load cookies from a file named `none` - if such a file exists and is readable in the current directory of the prog...

CVSS3: 3.7
EPSS: Низкий
fstec логотип

BDU:2023-06579

около 2 лет назад

Уязвимость функции curl_easy_duphandle библиотеки libcurl, позволяющая нарушителю создать или перезаписать файлы cookie

CVSS3: 3.7
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4650-1

почти 2 года назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4044-1

около 2 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4043-1

около 2 лет назад

Security update for curl

EPSS: Низкий
redos логотип

ROS-20231016-25

около 2 лет назад

Множественные уязвимости libcurl

CVSS3: 7.5
EPSS: Низкий
rocky логотип

RLSA-2023:5763

около 2 лет назад

Important: curl security update

EPSS: Низкий
oracle-oval логотип

ELSA-2023-6745

почти 2 года назад

ELSA-2023-6745: curl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-5763

около 2 лет назад

ELSA-2023-5763: curl security update (IMPORTANT)

EPSS: Низкий
rocky логотип

RLSA-2024:1601

больше 1 года назад

Moderate: curl security and bug fix update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-1601

больше 1 года назад

ELSA-2024-1601: curl security and bug fix update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-38546

This flaw allows an attacker to insert cookies at will into a running program using libcurl, if the specific series of conditions are met. libcurl performs transfers. In its API, an application creates "easy handles" that are the individual handles for single transfers. libcurl provides a function call that duplicates en easy handle called [curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html). If a transfer has cookies enabled when the handle is duplicated, the cookie-enable state is also cloned - but without cloning the actual cookies. If the source handle did not read any cookies from a specific file on disk, the cloned version of the handle would instead store the file name as `none` (using the four ASCII letters, no quotes). Subsequent use of the cloned handle that does not explicitly set a source to load cookies from would then inadvertently load cookies from a file named `none` - if such a file exists and is readable in the current directory of the program ...

CVSS3: 3.7
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-38546

This flaw allows an attacker to insert cookies at will into a running program using libcurl, if the specific series of conditions are met. libcurl performs transfers. In its API, an application creates "easy handles" that are the individual handles for single transfers. libcurl provides a function call that duplicates en easy handle called [curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html). If a transfer has cookies enabled when the handle is duplicated, the cookie-enable state is also cloned - but without cloning the actual cookies. If the source handle did not read any cookies from a specific file on disk, the cloned version of the handle would instead store the file name as `none` (using the four ASCII letters, no quotes). Subsequent use of the cloned handle that does not explicitly set a source to load cookies from would then inadvertently load cookies from a file named `none` - if such a file exists and is readable in the current directory of the program ...

CVSS3: 3.7
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-38546

This flaw allows an attacker to insert cookies at will into a running program using libcurl, if the specific series of conditions are met. libcurl performs transfers. In its API, an application creates "easy handles" that are the individual handles for single transfers. libcurl provides a function call that duplicates en easy handle called [curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html). If a transfer has cookies enabled when the handle is duplicated, the cookie-enable state is also cloned - but without cloning the actual cookies. If the source handle did not read any cookies from a specific file on disk, the cloned version of the handle would instead store the file name as `none` (using the four ASCII letters, no quotes). Subsequent use of the cloned handle that does not explicitly set a source to load cookies from would then inadvertently load cookies from a file named `none` - if such a file exists and is readable in the current directory of the program

CVSS3: 3.7
0%
Низкий
около 2 лет назад
msrc логотип
CVSS3: 3.7
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-38546

This flaw allows an attacker to insert cookies at will into a running ...

CVSS3: 3.7
0%
Низкий
около 2 лет назад
github логотип
GHSA-x3qx-m3c2-qfhx

This flaw allows an attacker to insert cookies at will into a running program using libcurl, if the specific series of conditions are met. libcurl performs transfers. In its API, an application creates "easy handles" that are the individual handles for single transfers. libcurl provides a function call that duplicates en easy handle called [curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html). If a transfer has cookies enabled when the handle is duplicated, the cookie-enable state is also cloned - but without cloning the actual cookies. If the source handle did not read any cookies from a specific file on disk, the cloned version of the handle would instead store the file name as `none` (using the four ASCII letters, no quotes). Subsequent use of the cloned handle that does not explicitly set a source to load cookies from would then inadvertently load cookies from a file named `none` - if such a file exists and is readable in the current directory of the prog...

CVSS3: 3.7
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-06579

Уязвимость функции curl_easy_duphandle библиотеки libcurl, позволяющая нарушителю создать или перезаписать файлы cookie

CVSS3: 3.7
0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:4650-1

Security update for curl

почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:4044-1

Security update for curl

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:4043-1

Security update for curl

около 2 лет назад
redos логотип
ROS-20231016-25

Множественные уязвимости libcurl

CVSS3: 7.5
около 2 лет назад
rocky логотип
RLSA-2023:5763

Important: curl security update

около 2 лет назад
oracle-oval логотип
ELSA-2023-6745

ELSA-2023-6745: curl security update (IMPORTANT)

почти 2 года назад
oracle-oval логотип
ELSA-2023-5763

ELSA-2023-5763: curl security update (IMPORTANT)

около 2 лет назад
rocky логотип
RLSA-2024:1601

Moderate: curl security and bug fix update

больше 1 года назад
oracle-oval логотип
ELSA-2024-1601

ELSA-2024-1601: curl security and bug fix update (MODERATE)

больше 1 года назад

Уязвимостей на страницу