发布时间: 2023年3月31日
修改时间: 2024年10月31日
An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.
NVD | openEuler | |
---|---|---|
Confidentiality | High | Low |
Attack Vector | Network | Local |
CVSS评分 | 5.9 | 5.8 |
Attack Complexity | High | High |
Privileges Required | None | Low |
Scope | Unchanged | Unchanged |
Integrity | None | Low |
User Interaction | None | None |
Availability | None | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2023-1240 | curl security update | 2023年3月31日 |
KylinSec-SA-2023-1253 | curl security update | 2023年3月31日 |
KylinSec-SA-2023-1887 | curl security update | 2023年3月31日 |
KylinSec-SA-2023-2126 | curl security update | 2023年3月31日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | curl | Fixed |
KY3.4-5A | curl | Fixed |
KY3.5.1 | curl | Fixed |
KY3.5.2 | curl | Fixed |