curl 7.1.1 to and including 7.75.0 is vulnerable to an “Exposure of Private Personal Information to an Unauthorized Actor” by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.
cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
curl.se/docs/CVE-2021-22876.html
hackerone.com/reports/1101882
lists.debian.org/debian-lts-announce/2021/05/msg00019.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
security.gentoo.org/glsa/202105-36
security.netapp.com/advisory/ntap-20210521-0007/
www.oracle.com//security-alerts/cpujul2021.html