3.7 Low
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
0.001 Low
EPSS
Percentile
35.0%
libcurl.so is vulnerable to Cookie Injection. The vulnerability is due to a lack of proper validation in the curl_easy_duphandle
function in easy.c
when setting the filename of the cookie to “none”, In case the parent handle didn’t specify a file. This flaw allows an attacker to insert cookies into a running program using libcurl by placing a malicious “none” file in the application’s directory.
seclists.org/fulldisclosure/2024/Jan/34
seclists.org/fulldisclosure/2024/Jan/37
seclists.org/fulldisclosure/2024/Jan/38
bugzilla.redhat.com/show_bug.cgi?id=2241938
curl.se/docs/CVE-2023-38546.html
github.com/curl/curl/commit/61275672b46d9abb32857404
lists.fedoraproject.org/archives/list/[email protected]/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/
support.apple.com/kb/HT214036
support.apple.com/kb/HT214057
support.apple.com/kb/HT214058
support.apple.com/kb/HT214063