Your submission was sent successfully! Close

CVE-2021-22876

Published: 31 March 2021

curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.

Priority

Medium

CVSS 3 base score: 5.3

Status

Package Release Status
curl
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.04 (Hirsute Hippo)
Released (7.74.0-1ubuntu2)
Ubuntu 20.04 LTS (Focal Fossa)
Released (7.68.0-1ubuntu2.5)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (7.58.0-2ubuntu3.13)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (7.47.0-1ubuntu2.19)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (7.35.0-1ubuntu2.20+esm7)
Patches:
Vendor: https://curl.se/XOXep4o2CSG0.patch