Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:43787
HistoryOct 12, 2023 - 8:53 a.m.

Cookie Injection

2023-10-1208:53:47
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
21
libcurl
cookie injection
validation
easy.c
running program

3.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

35.0%

libcurl.so is vulnerable to Cookie Injection. The vulnerability is due to a lack of proper validation in the curl_easy_duphandle function in easy.c when setting the filename of the cookie to “none”, In case the parent handle didn’t specify a file. This flaw allows an attacker to insert cookies into a running program using libcurl by placing a malicious “none” file in the application’s directory.

3.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

35.0%