Severity
5.3MEDIUM
EPSS
0.4%
top 37.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 5
Latest updateFeb 27

Description

curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() co

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages11 packages

NVDhaxx/curl7.77.78.0
Alpinecurl< 7.67.0-r5+12
Ubuntucurl< 7.58.0-2ubuntu3.14+4
CVEListV5https://github.com/curl/curlcurl 7.7 to and including 7.77.0

Also affects: Fedora 33

Patches

🔴Vulnerability Details

6
OSV
curl vulnerabilities2023-02-27
GHSA
GHSA-rjqf-6h27-xqfp: curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl2022-05-24
OSV
curl vulnerability2022-01-20
OSV
CVE-2021-22925: curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl2021-08-05
CVEList
CVE-2021-22925: curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl2021-08-05

📋Vendor Advisories

8
Ubuntu
curl vulnerabilities2023-02-27
Ubuntu
curl vulnerability2022-01-20
Apple
CVE-2021-22925: Security Update 2021-005 Catalina2021-09-13
Apple
CVE-2021-22925: macOS Big Sur 11.62021-09-13
Microsoft
curl supports the `-t` command line option known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser 2021-08-10

💬Community

1
HackerOne
CVE-2021-22925: TELNET stack contents disclosure again2021-07-21