• 公告ID (KylinSec-SA-2022-1130)

摘要:

When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user s expectations and intentions and without telling the user it happened.

安全等级: Low

公告ID: KylinSec-SA-2022-1130

发布日期: 2022年9月29日

关联CVE: CVE-2021-22923  

  • 详细介绍

1. 漏洞描述

   

When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user s expectations and intentions and without telling the user it happened.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2021-22923 KY3.4-4A mysql Unaffected
CVE-2021-22923 KY3.4-5 mysql Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2022-1113 下一篇:KylinSec-SA-2022-1131