发布时间: 2023年12月15日
修改时间: 2024年10月31日
This flaw allows a malicious HTTP server to set super cookies in curl thatare then passed back to more origins than what is otherwise allowed orpossible. This allows a site to set cookies that then would get sent todifferent and unrelated sites and domains.It could do this by exploiting a mixed case flaw in curl s function thatverifies a given cookie domain against the Public Suffix List (PSL). Forexample a cookie could be set with `domain=co.UK` when the URL used a lowercase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.
NVD | openEuler | |
---|---|---|
Confidentiality | Low | Low |
Attack Vector | Network | Network |
CVSS评分 | 6.5 | 5.3 |
Attack Complexity | Low | Low |
Privileges Required | None | None |
Scope | Unchanged | Unchanged |
Integrity | Low | None |
User Interaction | None | None |
Availability | None | None |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2023-1862 | curl security update | 2023年12月15日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | curl | Fixed |
KY3.4-5A | curl | Fixed |
KY3.5.1 | curl | Fixed |
KY3.5.2 | curl | Fixed |