curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Information
Published : 2021-04-01 11:15
Updated : 2022-04-06 09:19
NVD link : CVE-2021-22876
Mitre link : CVE-2021-22876
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
netapp
- hci_compute_node
- solidfire
- hci_management_node
- hci_storage_node
oracle
- essbase
- communications_billing_and_revenue_management
fedoraproject
- fedora
siemens
- sinec_infrastructure_network_services
broadcom
- fabric_operating_system
haxx
- libcurl
debian
- debian_linux