CVE-2021-22876

Published: 31 March 2021

curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.

Priority

Medium

Status

Package Release Status
curl
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.04 (Hirsute Hippo)
Released (7.74.0-1ubuntu2)
Ubuntu 20.10 (Groovy Gorilla)
Released (7.68.0-1ubuntu4.3)
Ubuntu 20.04 LTS (Focal Fossa)
Released (7.68.0-1ubuntu2.5)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (7.58.0-2ubuntu3.13)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (7.47.0-1ubuntu2.19)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (7.35.0-1ubuntu2.20+esm7)
Patches:
Vendor: https://curl.se/XOXep4o2CSG0.patch