CVE-2023-27535

An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.9 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
hackeroneCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 7%
VendorProductVersion
haxxlibcurl
7.13.0 ≤
𝑥
≤ 7.88.1
debiandebian_linux
10.0
netappactive_iq_unified_manager
-
netappontap_9
-
netapph300s_firmware
-
netapph500s_firmware
-
netapph700s_firmware
-
netapph410s_firmware
-
splunkuniversal_forwarder
8.2.0 ≤
𝑥
< 8.2.12
splunkuniversal_forwarder
9.0.0 ≤
𝑥
< 9.0.6
splunkuniversal_forwarder
9.1.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
curl
bullseye
7.74.0-1.3+deb11u13
fixed
bullseye (security)
7.74.0-1.3+deb11u14
fixed
bookworm
7.88.1-10+deb12u8
fixed
bookworm (security)
7.88.1-10+deb12u5
fixed
trixie
8.11.1-1
fixed
sid
8.11.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
curl
lunar
Fixed 7.88.1-6ubuntu2
released
kinetic
Fixed 7.85.0-1ubuntu0.5
released
jammy
Fixed 7.81.0-1ubuntu1.10
released
focal
Fixed 7.68.0-1ubuntu2.18
released
bionic
Fixed 7.58.0-2ubuntu3.24
released
xenial
Fixed 7.47.0-1ubuntu2.19+esm8
released
trusty
Fixed 7.35.0-1ubuntu2.20+esm15
released