CVE-2022-27774

EUVD-2022-32270
An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.7 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 51%
Affected Products (NVD)
VendorProductVersion
haxxcurl
4.9 ≤
𝑥
≤ 7.82.0
debiandebian_linux
10.0
debiandebian_linux
11.0
netapphci_bootstrap_os
-
netappclustered_data_ontap
-
netappsolidfire_\&_hci_management_node
-
netappsolidfire_\&_hci_storage_node
-
brocadefabric_operating_system
-
netapph300s_firmware
-
netapph500s_firmware
-
netapph700s_firmware
-
netapph410s_firmware
-
splunkuniversal_forwarder
8.2.0 ≤
𝑥
< 8.2.12
splunkuniversal_forwarder
9.0.0 ≤
𝑥
< 9.0.6
splunkuniversal_forwarder
9.1.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
curl
bookworm
7.88.1-10+deb12u7
fixed
bookworm (security)
7.88.1-10+deb12u5
fixed
bullseye
7.74.0-1.3+deb11u13
fixed
bullseye (security)
7.74.0-1.3+deb11u11
fixed
sid
8.10.1-2
fixed
trixie
8.10.1-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
curl
bionic
Fixed 7.58.0-2ubuntu3.17
released
focal
Fixed 7.68.0-1ubuntu2.10
released
impish
Fixed 7.74.0-1.3ubuntu2.1
released
jammy
Fixed 7.81.0-1ubuntu1.1
released
trusty
ignored
xenial
ignored