CVE-2023-46218

This flaw allows a malicious HTTP server to set "super cookies" in curl that
are then passed back to more origins than what is otherwise allowed or
possible. This allows a site to set cookies that then would get sent to
different and unrelated sites and domains.

It could do this by exploiting a mixed case flaw in curl's function that
verifies a given cookie domain against the Public Suffix List (PSL). For
example a cookie could be set with `domain=co.UK` when the URL used a lower
case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
hackeroneCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 54%
VendorProductVersion
haxxcurl
7.46.0 ≤
𝑥
≤ 8.4.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
curl
bullseye
7.74.0-1.3+deb11u13
fixed
bullseye (security)
7.74.0-1.3+deb11u14
fixed
bookworm
7.88.1-10+deb12u8
fixed
bookworm (security)
7.88.1-10+deb12u5
fixed
sid
8.11.1-1
fixed
trixie
8.11.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
curl
mantic
Fixed 8.2.1-1ubuntu3.2
released
lunar
Fixed 7.88.1-8ubuntu2.4
released
jammy
Fixed 7.81.0-1ubuntu1.15
released
focal
Fixed 7.68.0-1ubuntu2.21
released
bionic
Fixed 7.58.0-2ubuntu3.24+esm3
released
xenial
Fixed 7.47.0-1ubuntu2.19+esm11
released
trusty
not-affected