cURL/libcurl 7.x < 7.49.1 RCE

high Nessus Network Monitor Plugin ID 9763
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The host is running a version of cURL/libcurl that is vulnerable to a Remote Code Exection (RCE) attack vector.


Versions of cURL and libcurl prior to 7.49.1 are affected by a flaw that is triggered when loading certain dynamic-link libraries including 'security.dll', 'secur32.dll', and 'ws2_32.dll'. The program uses an insecure path to look for specific files or libraries that includes the current working directory, which may not be trusted or under user control. By placing a specially crafted library in the path and tricking a user into opening a FILETYPE file located on a remote WebDAV share, a context-dependent attacker can inject and execute arbitrary code with the privilege of the user running the program.


Upgrade to cURL/libcurl 7.49.1 or later.

See Also

Plugin Details

Severity: High

ID: 9763

Family: Web Clients

Published: 11/11/2016

Updated: 3/6/2019

Dependencies: 9772

Nessus ID: 92558

Risk Information


Risk Factor: Medium

Base Score: 6.9

Temporal Score: 6

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C


Risk Factor: High

Base Score: 7.4

Temporal Score: 7.1

Vector: CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*

Patch Publication Date: 5/30/2016

Vulnerability Publication Date: 5/30/2016

Reference Information

CVE: CVE-2016-4802

BID: 90997