Lucene search

K
amazonAmazonALAS-2024-2531
HistoryApr 24, 2024 - 10:15 p.m.

Medium: curl

2024-04-2422:15:00
alas.aws.amazon.com
9
curl
flaw
super cookies
http server
exploiting
domain verification
security update

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

6.9 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.1%

Issue Overview:

This flaw allows a malicious HTTP server to set “super cookies” in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains.

It could do this by exploiting a mixed case flaw in curl’s function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with domain=co.UK when the URL used a lowercase hostname curl.co.uk, even though co.uk is listed as a PSL domain. (CVE-2023-46218)

Affected Packages:

curl

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update curl to update your system.

New Packages:

aarch64:  
    curl-8.3.0-1.amzn2.0.6.aarch64  
    libcurl-8.3.0-1.amzn2.0.6.aarch64  
    libcurl-devel-8.3.0-1.amzn2.0.6.aarch64  
    curl-debuginfo-8.3.0-1.amzn2.0.6.aarch64  
  
i686:  
    curl-8.3.0-1.amzn2.0.6.i686  
    libcurl-8.3.0-1.amzn2.0.6.i686  
    libcurl-devel-8.3.0-1.amzn2.0.6.i686  
    curl-debuginfo-8.3.0-1.amzn2.0.6.i686  
  
src:  
    curl-8.3.0-1.amzn2.0.6.src  
  
x86_64:  
    curl-8.3.0-1.amzn2.0.6.x86_64  
    libcurl-8.3.0-1.amzn2.0.6.x86_64  
    libcurl-devel-8.3.0-1.amzn2.0.6.x86_64  
    curl-debuginfo-8.3.0-1.amzn2.0.6.x86_64  

Additional References

Red Hat: CVE-2023-46218

Mitre: CVE-2023-46218

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

6.9 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.1%