CVE-2023-27536
30.03.2023, 20:15
An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.Enginsight
Vendor | Product | Version |
---|---|---|
haxx | libcurl | 7.22.0 ≤ 𝑥 ≤ 7.88.1 |
debian | debian_linux | 10.0 |
netapp | active_iq_unified_manager | - |
netapp | h300s_firmware | - |
netapp | h500s_firmware | - |
netapp | h700s_firmware | - |
netapp | h410s_firmware | - |
splunk | universal_forwarder | 8.2.0 ≤ 𝑥 < 8.2.12 |
splunk | universal_forwarder | 9.0.0 ≤ 𝑥 < 9.0.6 |
splunk | universal_forwarder | 9.1.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
- CWE-305 - Authentication Bypass by Primary WeaknessThe authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.
- CWE-287 - Improper AuthenticationWhen an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
References