CVE-2023-23915
Published: 15 February 2023
A cleartext transmission of sensitive information vulnerability exists in curl <v7.88.0 that could cause HSTS functionality to behave incorrectly when multiple URLs are requested in parallel. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. This HSTS mechanism would however surprisingly fail when multiple transfers are done in parallel as the HSTS cache file gets overwritten by the most recentlycompleted transfer. A later HTTP-only transfer to the earlier host name would then *not* get upgraded properly to HSTS.
Notes
Author | Note |
---|---|
mdeslaur | introduced in 7.77 same commits as CVE-2023-23914 |
Priority
Status
Package | Release | Status |
---|---|---|
curl Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(code not present)
|
focal |
Not vulnerable
(code not present)
|
|
jammy |
Released
(7.81.0-1ubuntu1.8)
|
|
lunar |
Released
(7.87.0-2ubuntu1)
|
|
trusty |
Not vulnerable
(code not present)
|
|
upstream |
Released
(7.88.0)
|
|
xenial |
Not vulnerable
(code not present)
|
|
kinetic |
Released
(7.85.0-1ubuntu0.3)
|
|
Patches: upstream: https://github.com/curl/curl/commit/076a2f629119222aeeb50f5a03bf9f9052fabb9a upstream: https://github.com/curl/curl/commit/0bf8b796a0ea98395b390c7807187982215f5c11 upstream: https://github.com/curl/curl/commit/ca02a77f05bd5cef20618c8f741aa48b7be0a648 upstream: https://github.com/curl/curl/commit/dc0725244a3163f1e2d5f51165db3a1a430f3ba0 upstream: https://github.com/curl/curl/commit/ea5aaaa5ede53819f8bc7ae767fc2d13d3704d37 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |