Логотип exploitDog
bind:"CVE-2023-27533" OR bind:"CVE-2023-27536" OR bind:"CVE-2023-27538" OR bind:"CVE-2023-27534"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-27533" OR bind:"CVE-2023-27536" OR bind:"CVE-2023-27538" OR bind:"CVE-2023-27534"

Количество 39

Количество 39

github логотип

GHSA-4f9f-mpmj-4c52

около 2 лет назад

An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2023-02109

около 2 лет назад

Уязвимость функции повторного использования соединения библиотеки libcurl, позволяющая нарушителю повлиять на передачу данных krb5/kerberos / negotiate /GSSAPI и потенциально привести к несанкционированному доступу к конфиденциальной информации

CVSS3: 5.9
EPSS: Низкий
rocky логотип

RLSA-2023:4523

больше 1 года назад

Moderate: curl security update

EPSS: Низкий
oracle-oval логотип

ELSA-2023-4523

почти 2 года назад

ELSA-2023-4523: curl security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2023-02106

около 2 лет назад

Уязвимость библиотеки libcurl, связанная с повторным использованием FTP-соединения, позволяющая нарушителю использовать неправильные учетные данные при выполнении передачи, что потенциально может привести к раскрытию защищаемой информации

CVSS3: 5.9
EPSS: Низкий
ubuntu логотип

CVE-2023-27538

около 2 лет назад

An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2023-27538

около 2 лет назад

An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2023-27538

около 2 лет назад

An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.

CVSS3: 5.5
EPSS: Низкий
msrc логотип

CVE-2023-27538

около 2 лет назад

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2023-27538

около 2 лет назад

An authentication bypass vulnerability exists in libcurl prior to v8.0 ...

CVSS3: 5.5
EPSS: Низкий
ubuntu логотип

CVE-2023-27534

около 2 лет назад

A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.

CVSS3: 8.8
EPSS: Низкий
redhat логотип

CVE-2023-27534

около 2 лет назад

A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.

CVSS3: 3.7
EPSS: Низкий
nvd логотип

CVE-2023-27534

около 2 лет назад

A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.

CVSS3: 8.8
EPSS: Низкий
msrc логотип

CVE-2023-27534

около 2 лет назад

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2023-27534

около 2 лет назад

A path traversal vulnerability exists in curl <8.0.0 SFTP implementati ...

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-cgj3-cvg6-pcvh

около 2 лет назад

An authentication bypass vulnerability exists in libcurl v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-4j25-c9rf-fp5f

около 2 лет назад

A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2023-02103

около 2 лет назад

Уязвимость библиотеки libcurl, связанная с обходом процедуры аутентификации, позволяющая нарушителю повторно использовать неподходящее соединение

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2023-02084

около 2 лет назад

Уязвимость утилиты программной строки curl, связанная неправильной заменой символа тильды (~) при использовании в качестве префикса в первом элементе path, позволяющая нарушителю обойти фильтрацию или выполнить произвольный код

CVSS3: 3.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-4f9f-mpmj-4c52

An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.

CVSS3: 9.8
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-02109

Уязвимость функции повторного использования соединения библиотеки libcurl, позволяющая нарушителю повлиять на передачу данных krb5/kerberos / negotiate /GSSAPI и потенциально привести к несанкционированному доступу к конфиденциальной информации

CVSS3: 5.9
0%
Низкий
около 2 лет назад
rocky логотип
RLSA-2023:4523

Moderate: curl security update

больше 1 года назад
oracle-oval логотип
ELSA-2023-4523

ELSA-2023-4523: curl security update (MODERATE)

почти 2 года назад
fstec логотип
BDU:2023-02106

Уязвимость библиотеки libcurl, связанная с повторным использованием FTP-соединения, позволяющая нарушителю использовать неправильные учетные данные при выполнении передачи, что потенциально может привести к раскрытию защищаемой информации

CVSS3: 5.9
0%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2023-27538

An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.

CVSS3: 5.5
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-27538

An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.

CVSS3: 5.5
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-27538

An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.

CVSS3: 5.5
0%
Низкий
около 2 лет назад
msrc логотип
CVSS3: 5.5
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-27538

An authentication bypass vulnerability exists in libcurl prior to v8.0 ...

CVSS3: 5.5
0%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2023-27534

A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.

CVSS3: 8.8
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-27534

A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.

CVSS3: 3.7
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-27534

A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.

CVSS3: 8.8
0%
Низкий
около 2 лет назад
msrc логотип
CVSS3: 8.8
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-27534

A path traversal vulnerability exists in curl <8.0.0 SFTP implementati ...

CVSS3: 8.8
0%
Низкий
около 2 лет назад
github логотип
GHSA-cgj3-cvg6-pcvh

An authentication bypass vulnerability exists in libcurl v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.

CVSS3: 5.5
0%
Низкий
около 2 лет назад
github логотип
GHSA-4j25-c9rf-fp5f

A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.

CVSS3: 8.8
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-02103

Уязвимость библиотеки libcurl, связанная с обходом процедуры аутентификации, позволяющая нарушителю повторно использовать неподходящее соединение

CVSS3: 6.5
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-02084

Уязвимость утилиты программной строки curl, связанная неправильной заменой символа тильды (~) при использовании в качестве префикса в первом элементе path, позволяющая нарушителю обойти фильтрацию или выполнить произвольный код

CVSS3: 3.7
0%
Низкий
около 2 лет назад

Уязвимостей на страницу