Haxx Curl vulnerabilities
182 known vulnerabilities affecting haxx/curl.
Total CVEs
182
CISA KEV
0
Public exploits
2
Exploited in wild
0
Severity breakdown
CRITICAL32HIGH59MEDIUM77LOW14
Vulnerabilities
Page 5 of 10
CVE-2021-22897MEDIUMCVSS 5.3≥ 7.61.0, ≤ 7.76.12021-06-11
CVE-2021-22897 [MEDIUM] CWE-840 CVE-2021-22897: curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake i
curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single "static" variable in the library, which has the surprising side-effect that if an application sets up multiple
nvdosv
CVE-2021-22898LOWCVSS 3.1≥ 7.7, ≤ 7.76.12021-06-11
CVE-2021-22898 [LOW] CWE-200 CVE-2021-22898: curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, kn
curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the se
nvdosv
CVE-2021-22890LOWCVSS 3.7≥ 0, < 7.74.0-1.22021-04-01
CVE-2021-22890 [LOW] CVE-2021-22890: curl 7
curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly "short-cut" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session tic
osv
CVE-2021-22876MEDIUMCVSS 5.3≥ 0, < 7.47.0-1ubuntu2.19≥ 0, < 7.58.0-2ubuntu3.13+1 more2021-03-31
CVE-2021-22876 [MEDIUM] curl vulnerabilities
curl vulnerabilities
Viktor Szakats discovered that curl did not strip off user credentials
from referrer header fields. A remote attacker could possibly use this
issue to obtain sensitive information. (CVE-2021-22876)
Mingtao Yang discovered that curl incorrectly handled session tickets when
using an HTTPS proxy. A remote attacker in control of an HTTPS proxy could
use this issue to bypass certificate checks and intercept communications.
This issue
osv
CVE-2020-8177HIGHCVSS 7.8≥ 7.20.0, ≤ 7.70.02020-12-14
CVE-2020-8177 [HIGH] CWE-99 CVE-2020-8177: curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resour
curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.
nvdosv
CVE-2020-8169HIGHCVSS 7.5≥ 7.62.0, ≤ 7.70.02020-12-14
CVE-2020-8169 [HIGH] CWE-200 CVE-2020-8169: curl 7.62.0 through 7.70.0 is vulnerable to an information disclosure vulnerability that can lead to
curl 7.62.0 through 7.70.0 is vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).
nvdosv
CVE-2020-8286HIGHCVSS 7.5≥ 0, < 7.74.0-12020-12-14
CVE-2020-8286 [HIGH] CVE-2020-8286: curl 7
curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.
osv
CVE-2020-8285HIGHCVSS 7.5≥ 0, < 7.74.0-12020-12-14
CVE-2020-8285 [HIGH] CVE-2020-8285: curl 7
curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.
osv
CVE-2020-8284LOWCVSS 3.7≤ 7.73.02020-12-14
CVE-2020-8284 [LOW] CWE-200 CVE-2020-8284: A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting ba
A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.
nvdosv
CVE-2020-8231HIGHCVSS 7.5≥ 0, < 7.47.0-1ubuntu2.18≥ 0, < 7.58.0-2ubuntu3.12+1 more2020-12-09
CVE-2020-8231 [HIGH] curl vulnerabilities
curl vulnerabilities
Marc Aldorasi discovered that curl incorrectly handled the libcurl
CURLOPT_CONNECT_ONLY option. This could result in data being sent to the
wrong destination, possibly exposing sensitive information. This issue only
affected Ubuntu 20.10. (CVE-2020-8231)
Varnavas Papaioannou discovered that curl incorrectly handled FTP PASV
responses. An attacker could possibly use this issue to trick curl into
connecting to an arbitrary IP address
osv
CVE-2016-4606CRITICALCVSS 9.8fixed in 7.49.1vbefore 7.49.12020-02-21
CVE-2016-4606 [CRITICAL] CVE-2016-4606: Curl before 7.49.1 in Apple OS X before macOS Sierra prior to 10.12 allows remote or local attackers
Curl before 7.49.1 in Apple OS X before macOS Sierra prior to 10.12 allows remote or local attackers to execute arbitrary code, gain sensitive information, cause denial-of-service conditions, bypass security restrictions, and perform unauthorized actions. This may aid in other attacks.
cvelistv5nvd
CVE-2019-5482CRITICALCVSS 9.8≥ 7.19.4, ≤ 7.65.3v7.19.4 to 7.65.32019-09-16
CVE-2019-5482 [CRITICAL] CWE-122 CVE-2019-5482: Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
cvelistv5nvdosv
CVE-2019-5481CRITICALCVSS 9.8≥ 7.52.0, ≤ 7.65.3v7.52.0 to 7.65.32019-09-16
CVE-2019-5481 [CRITICAL] CWE-415 CVE-2019-5481: Double-free vulnerability in the FTP-kerberos code in cURL 7.52.0 to 7.65.3.
Double-free vulnerability in the FTP-kerberos code in cURL 7.52.0 to 7.65.3.
cvelistv5nvdosv
CVE-2019-5443HIGHCVSS 7.8≤ 7.65.12019-07-02
CVE-2019-5443 [HIGH] CWE-94 CVE-2019-5443: A non-privileged user or program can put code and a config file in a known non-privileged path (unde
A non-privileged user or program can put code and a config file in a known non-privileged path (under C:/usr/local/) that will make curl <= 7.65.1 automatically run the code (as an openssl "engine") on invocation. If that curl is invoked by a privileged user it can do anything it wants.
cvelistv5nvd
CVE-2019-5436HIGHCVSS 7.8≥ 0, < 7.64.0-42019-05-28
CVE-2019-5436 [HIGH] CVE-2019-5436: A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7
A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.
osv
CVE-2019-5435LOWCVSS 3.7≥ 7.62.0, ≤ 7.64.12019-05-28
CVE-2019-5435 [LOW] CWE-131 CVE-2019-5435: An integer overflow in curl's URL API results in a buffer overflow in libcurl 7.62.0 to and includin
An integer overflow in curl's URL API results in a buffer overflow in libcurl 7.62.0 to and including 7.64.1.
nvdosv
CVE-2019-3822CRITICALCVSS 9.8≥ 0, < 7.64.0-12019-02-06
CVE-2019-3822 [CRITICAL] CVE-2019-3822: libcurl versions from 7
libcurl versions from 7.36.0 to before 7.64.0 are vulnerable to a stack-based buffer overflow. The function creating an outgoing NTLM type-3 header (`lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()`), generates the request HTTP header contents based on previously received data. The check that exists to prevent the local buffer from getting overflowed is implemented wrongly (using unsigned math) and as such it does not prevent
osv
CVE-2018-16890HIGHCVSS 7.5≥ 0, < 7.64.0-12019-02-06
CVE-2018-16890 [HIGH] CVE-2018-16890: libcurl versions from 7
libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer r
osv
CVE-2019-3823HIGHCVSS 7.5≥ 0, < 7.64.0-12019-02-06
CVE-2019-3823 [HIGH] CVE-2019-3823: libcurl versions from 7
libcurl versions from 7.34.0 to before 7.64.0 are vulnerable to a heap out-of-bounds read in the code handling the end-of-response for SMTP. If the buffer passed to `smtp_endofresp()` isn't NUL terminated and contains no character ending the parsed number, and `len` is set to 5, then the `strtol()` call reads beyond the allocated buffer. The read contents will not be returned to the caller.
osv
CVE-2018-16842CRITICALCVSS 9.1≥ 7.14.1, ≤ 7.61.12018-10-31
CVE-2018-16842 [CRITICAL] CWE-125 CVE-2018-16842: Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs
Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.
nvdosv