CVE-2016-8624

MEDIUM

Description

curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.

References

http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html

http://www.securityfocus.com/bid/94103

http://www.securitytracker.com/id/1037192

https://access.redhat.com/errata/RHSA-2018:2486

https://access.redhat.com/errata/RHSA-2018:3558

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624

https://curl.haxx.se/docs/adv_20161102J.html

https://lists.apache.org/thread.html/[email protected]%3Ccommits.pulsar.apache.org%3E

https://security.gentoo.org/glsa/201701-47

https://www.tenable.com/security/tns-2016-21

Details

Source: MITRE

Published: 2018-07-31

Updated: 2020-09-14

Type: CWE-20

Risk Information

CVSS v2.0

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3.0

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*

Tenable Plugins

View all (22 total)

IDNameProductFamilySeverity
140168OracleVM 3.4 : curl (OVMSA-2020-0035)NessusOracleVM Local Security Checks
high
131701Juniper Junos Space < 19.2R1 Multiple Vulnerabilities (JSA10951)NessusJunos Local Security Checks
high
125380Oracle Linux 6 / 7 : curl (ELSA-2019-4652)NessusOracle Linux Local Security Checks
high
125002EulerOS Virtualization 3.0.1.0 : curl (EulerOS-SA-2019-1549)NessusHuawei Local Security Checks
high
105445F5 Networks BIG-IP : cURL and libcurl vulnerability (K85235351)NessusF5 Networks Local Security Checks
medium
99930Oracle Secure Global Desktop Multiple Vulnerabilities (April 2017 CPU) (SWEET32)NessusMisc.
high
99881EulerOS 2.0 SP1 : curl (EulerOS-SA-2017-1036)NessusHuawei Local Security Checks
high
99880EulerOS 2.0 SP2 : curl (EulerOS-SA-2017-1035)NessusHuawei Local Security Checks
high
96644GLSA-201701-47 : cURL: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
95917macOS 10.12.x < 10.12.2 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
high
9826cURL/libcurl 7.x < 7.51.0 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
high
95009Fedora 25 : curl (2016-89769648a0)NessusFedora Local Security Checks
high
94941Debian DLA-711-1 : curl security updateNessusDebian Local Security Checks
high
94752openSUSE Security Update : curl (openSUSE-2016-1280)NessusSuSE Local Security Checks
high
94686Amazon Linux AMI : curl (ALAS-2016-766)NessusAmazon Linux Local Security Checks
high
94592Fedora 24 : curl (2016-e8e8cdb4ed)NessusFedora Local Security Checks
high
94588Debian DSA-3705-1 : curl - security updateNessusDebian Local Security Checks
high
94574Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS / 16.10 : curl vulnerabilities (USN-3123-1)NessusUbuntu Local Security Checks
high
94572SUSE SLES11 Security Update : curl (SUSE-SU-2016:2714-1)NessusSuSE Local Security Checks
high
94516Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / 14.2 / current : curl (SSA:2016-308-01)NessusSlackware Local Security Checks
high
94506SUSE SLED12 / SLES12 Security Update : curl (SUSE-SU-2016:2699-1)NessusSuSE Local Security Checks
high
94493FreeBSD : cURL -- multiple vulnerabilities (765feb7d-a0d1-11e6-a881-b499baebfeaf)NessusFreeBSD Local Security Checks
high