SynopsisThe host is running a version of cURL/libcurl that is vulnerable to multiple attack vectors.
DescriptionVersions of cURL and libcurl prior to 7.47.0 are affected by multiple vulnerabilities :
- A flaw exists that allows traversing outside of a restricted path. The issue is due to the program not properly sanitizing colon characters, specifically path traversal style attacks (e.g. '../') supplied via file names. With a specially crafted file name, a context-dependent attacker can write arbitrary files. (CVE-2016-0754)
- A flaw exists in the 'ConnectionExists()' function in 'lib/url.c' that is triggered as credentials are not properly compared in proxy NTLM authentication. This may allow a remote attacker to reuse connections. (CVE-2016-0755)
SolutionUpgrade to cURL/libcurl 7.47.0 or later.