curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
History
No history.
Information
Published : 2021-04-01 18:15
Updated : 2024-03-27 15:47
NVD link : CVE-2021-22876
Mitre link : CVE-2021-22876
CVE.ORG link : CVE-2021-22876
JSON object : View
Products Affected
splunk
- universal_forwarder
netapp
- hci_compute_node
- hci_storage_node
- hci_management_node
- solidfire
siemens
- sinec_infrastructure_network_services
oracle
- communications_billing_and_revenue_management
- essbase
broadcom
- fabric_operating_system
fedoraproject
- fedora
haxx
- libcurl
debian
- debian_linux