Linux Distros Unpatched Vulnerability : CVE-2024-11053

low Nessus Plugin ID 227747

Synopsis

The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.

Description

The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.

- When asked to both use a `.netrc` file for credentials and to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has an entry that matches the redirect target hostname but the entry either omits just the password or omits both login and password. (CVE-2024-11053)

Note that Nessus relies on the presence of the package as reported by the vendor.

Solution

There is no known solution at this time.

See Also

https://access.redhat.com/security/cve/cve-2024-11053

https://ubuntu.com/security/CVE-2024-11053

Plugin Details

Severity: Low

ID: 227747

File Name: unpatched_CVE_2024_11053.nasl

Version: 1.3

Type: local

Agent: unix

Family: Misc.

Published: 3/5/2025

Updated: 9/2/2025

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.4

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2024-11053

CVSS v3

Risk Factor: Low

Base Score: 3.4

Temporal Score: 3.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2024-11053

Vulnerability Information

CPE: p-cpe:/a:centos:centos:mysql8.4-libs, p-cpe:/a:centos:centos:mysql8.4-test-data, p-cpe:/a:redhat:enterprise_linux:mysql8.4-common, p-cpe:/a:redhat:enterprise_linux:libcurl-minimal, p-cpe:/a:redhat:enterprise_linux:mysql8.4, p-cpe:/a:redhat:enterprise_linux:mysql8.4-test-data, p-cpe:/a:centos:centos:mysql8.4-errmsg, cpe:/o:redhat:enterprise_linux:9, cpe:/o:canonical:ubuntu_linux:18.04:-:lts, p-cpe:/a:centos:centos:mysql8.4-test, cpe:/o:centos:centos:8, p-cpe:/a:redhat:enterprise_linux:curl, p-cpe:/a:redhat:enterprise_linux:libcurl-devel, cpe:/o:redhat:enterprise_linux:8, cpe:/o:redhat:enterprise_linux:10, cpe:/o:canonical:ubuntu_linux:14.04:-:lts, p-cpe:/a:centos:centos:mysql8.4-common, p-cpe:/a:redhat:enterprise_linux:mysql8.4-devel, p-cpe:/a:redhat:enterprise_linux:mysql8.4-errmsg, p-cpe:/a:redhat:enterprise_linux:mysql8.4-test, p-cpe:/a:centos:centos:mysql8.4-server, p-cpe:/a:centos:centos:libcurl-minimal, p-cpe:/a:centos:centos:mysql8.4, p-cpe:/a:redhat:enterprise_linux:libcurl, p-cpe:/a:redhat:enterprise_linux:mysql8.4-libs, cpe:/o:canonical:ubuntu_linux:16.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:curl, p-cpe:/a:centos:centos:curl, p-cpe:/a:redhat:enterprise_linux:curl-minimal, p-cpe:/a:centos:centos:mysql8.4-devel, p-cpe:/a:redhat:enterprise_linux:mysql8.4-server, p-cpe:/a:centos:centos:libcurl, p-cpe:/a:centos:centos:libcurl-devel, p-cpe:/a:centos:centos:curl-minimal

Required KB Items: Host/OS/identifier, Host/cpu, Host/local_checks_enabled, global_settings/vendor_unpatched

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 12/11/2024

Reference Information

CVE: CVE-2024-11053