cURL/libcURL 7.x < 7.38.0 Multiple Vulnerabilities

low Nessus Network Monitor Plugin ID 8385
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The cURL program is a library and command-line tool for transferring data using various protocols, including HTTP, FTP, and LDAP. A vulnerable version of cURL was detected from the host.


Versions of cURL/libcURL older than 7.38.0 are unpatched for the following remote security bypass vulnerabilities due to errors in the way it handles cookies:

- Handling of IP addresses in cookie domain when parsing received HTTP cookies can be leveraged to obtain sensitive information, such as HTTP cookies (CVE-2014-3613)

- Failure to restrict libcurl-based HTTP clients from leaking cookie information, which can be leveraged by setting cookies to Top Level Domains (TLD) to bypass security restrictions to an unrelated site or domain (CVE-2014-3620)


Upgrade the affected packages; the next version of cURL/libcURL that fixes the issue is cURL 7.38.0.

See Also

Plugin Details

Severity: Low

ID: 8385

Family: Web Clients

Published: 9/11/2014

Updated: 3/6/2019

Dependencies: 1735, 8314

Risk Information


Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C


Risk Factor: Low

Base Score: 3.7

Temporal Score: 3.6

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*

Patch Publication Date: 9/10/2014

Vulnerability Publication Date: 9/10/2014

Reference Information

CVE: CVE-2014-3613, CVE-2014-3620

BID: 69742, 69748