5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
9.4 High
AI Score
Confidence
High
0.008 Low
EPSS
Percentile
81.2%
YAMADA Yasuharu discovered that libcurl was vulnerable to a cookie
leak when doing requests across domains with matching tails. curl did
not properly restrict cookies to domains and subdomains. If a user or
automated system were tricked into processing a specially crafted URL,
an attacker could read cookie values stored by unrelated webservers.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 8.04 | noarch | curl | < 7.18.0-1ubuntu2.4 | UNKNOWN |
Ubuntu | 8.04 | noarch | libcurl3 | < 7.18.0-1ubuntu2.4 | UNKNOWN |
Ubuntu | 8.04 | noarch | libcurl3-dbg | < 7.18.0-1ubuntu2.4 | UNKNOWN |
Ubuntu | 8.04 | noarch | libcurl3-gnutls | < 7.18.0-1ubuntu2.4 | UNKNOWN |
Ubuntu | 8.04 | noarch | libcurl4-gnutls-dev | < 7.18.0-1ubuntu2.4 | UNKNOWN |
Ubuntu | 8.04 | noarch | libcurl4-openssl-dev | < 7.18.0-1ubuntu2.4 | UNKNOWN |
Ubuntu | 12.10 | noarch | curl | < 7.27.0-1ubuntu1.2 | UNKNOWN |
Ubuntu | 12.10 | noarch | curl-udeb | < 7.27.0-1ubuntu1.2 | UNKNOWN |
Ubuntu | 12.10 | noarch | libcurl3 | < 7.27.0-1ubuntu1.2 | UNKNOWN |
Ubuntu | 12.10 | noarch | libcurl3-dbg | < 7.27.0-1ubuntu1.2 | UNKNOWN |