• CVE-2023-27535

发布时间: 2023年3月31日

修改时间: 2024年10月31日

概要

An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.

CVSS v3 指标

NVD openEuler
Confidentiality High Low
Attack Vector Network Local
CVSS评分 5.9 5.8
Attack Complexity High High
Privileges Required None Low
Scope Unchanged Unchanged
Integrity None Low
User Interaction None None
Availability None High

安全公告

公告名 概要 发布时间
KylinSec-SA-2023-1240 curl security update 2023年3月31日
KylinSec-SA-2023-1253 curl security update 2023年3月31日
KylinSec-SA-2023-1887 curl security update 2023年3月31日
KylinSec-SA-2023-2126 curl security update 2023年3月31日

影响产品

产品 状态
KY3.4-4A curl Fixed
KY3.4-5A curl Fixed
KY3.5.1 curl Fixed
KY3.5.2 curl Fixed