#15301 closed enhancement (fixed)
cURL-7.78.0
Reported by: | Douglas R. Reno | Owned by: | Tim Tassonis |
---|---|---|---|
Priority: | elevated | Milestone: | 11.0 |
Component: | BOOK | Version: | git |
Severity: | normal | Keywords: | |
Cc: |
Description ¶
New minor version.
Contains 5 security fixes.
Change History (9)
comment:2 by , 4 years ago
CVE-2021-22922 curl: Wrong content via metalink not discarded
Wrong content via metalink not discarded ======================================== Project curl Security Advisory, July 21th 2021 - [Permalink](https://curl.se/docs/CVE-2021-22922.html) VULNERABILITY ------------- When curl is instructed to download content using the metalink feature, the contents is verified against a hash provided in the metalink XML file. The metalink XML file points out to the client how to get the same content from a set of different URLs, potentially hosted by different servers and the client can then download the file from one or several of them. In a serial or parallel manner. If one of the servers hosting the contents has been breached and the contents of the specific file on that server is replaced with a modified payload, curl should detect this when the hash of the file mismatches after a completed download. It should remove the contents and instead try getting the contents from another URL. This is not done, and instead such a hash mismatch is only mentioned in text and the potentially malicious content is kept in the file on disk. There's a risk the user doesn't notice the message and instead assumes the file is fine. We are not aware of any exploit of this flaw. INFO ---- This flaw exists only in the curl tool. libcurl is not affected. This flaw has existed in curl since commit [b5fdbe848bc3d](https://github.com/curl/curl/commit/b5fdbe848bc3d) in curl 7.27.0, released on July 27, 2012. The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2021-22922 to this issue. CWE-20: Improper Input Validation Severity: Medium AFFECTED VERSIONS ----------------- - Affected versions: curl 7.27.0 to and including 7.77.0 - Not affected versions: curl < 7.27.0 and curl >= 7.78.0 THE SOLUTION ------------ curl has completely removed the metalink feature as of 7.78.0. No fix for this flaw will be produced by the curl project. The fix for earlier versions is to rebuild curl with the metalink support switched off! RECOMMENDATIONS -------------- A - Upgrade curl to version 7.78.0 B - Make sure you do not use metalink with curl C - Disable metalink in your build TIMELINE -------- This issue was reported to the curl project on May 30, 2021. This advisory was posted on Jul 21, 2021. CREDITS ------- This issue was reported by Harry Sintonen. Patched by Daniel Stenberg. Thanks a lot!
comment:3 by , 4 years ago
CVE-2021-22923 curl: Metalink download sends credentials
Metalink download sends credentials =================================== Project curl Security Advisory, July 21th 2021 - [Permalink](https://curl.se/docs/CVE-2021-22923.html) VULNERABILITY ------------- When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user's expectations and intentions and without telling the user it happened. We are not aware of any exploit of this flaw. INFO ---- This flaw exists only in the curl tool. libcurl is not affected. This flaw has existed in curl since commit [b5fdbe848bc3d](https://github.com/curl/curl/commit/b5fdbe848bc3d) in curl 7.27.0, released on July 27, 2012. The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2021-22923 to this issue. CWE-522: Insufficiently Protected Credentials Severity: Medium AFFECTED VERSIONS ----------------- - Affected versions: curl 7.27.0 to and including 7.77.0 - Not affected versions: curl < 7.27.0 and curl >= 7.78.0 THE SOLUTION ------------ curl has completely removed the metalink feature as of 7.78.0. No fix for this flaw will be produced by the curl project. The fix for earlier versions is to rebuild curl with the metalink support switched off! RECOMMENDATIONS -------------- A - Upgrade curl to version 7.78.0 B - Make sure you do not use metalink with curl C - Disable metalink in your build TIMELINE -------- This issue was reported to the curl project on May 30, 2021. This advisory was posted on Jul 21, 2021. CREDITS ------- This issue was reported by Harry Sintonen. Patched by Daniel Stenberg. Thanks a lot!
comment:4 by , 4 years ago
CVE-2021-22924 curl: bad connection reuse due to flawed path name checks
Bad connection reuse due to flawed path name checks =================================================== Project curl Security Advisory, July 21st 2021 - [Permalink](https://curl.se/docs/CVE-2021-22924.html) VULNERABILITY ------------- libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function did not take 'issuer cert' into account and it compared the involved paths *case insensitively*, which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn't include the 'issuer cert' which a transfer can set to qualify how to verify the server certificate. We are not aware of any exploit of this flaw. INFO ---- This flaw has existed in curl since commit [89721ff04af70f](https://github.com/curl/curl/commit/89721ff04af70f) in libcurl 7.10.4, released on April 2, 2003. The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2021-22924 to this issue. CWE-295: Improper Certificate Validation Severity: Medium AFFECTED VERSIONS ----------------- - Affected versions: curl 7.10.4 to and including 7.77.0 - Not affected versions: curl < 7.10.4 and curl >= 7.78.0 Also note that libcurl is used by many applications, and not always advertised as such. THE SOLUTION ------------ The SSL configs are compared appropriately. A [fix for CVE-2021-22924](https://github.com/curl/curl/commit/5ea3145850ebff1dc2b13d17440300a01ca38161) RECOMMENDATIONS -------------- A - Upgrade curl to version 7.78.0 B - Apply the patch to your local version TIMELINE -------- This issue was reported to the curl project on June 11, 2021. This advisory was posted on July 21, 2021. CREDITS ------- This issue was reported by Harry Sintonen. Patched by Daniel Stenberg. Thanks a lot!
comment:5 by , 4 years ago
CVE-2021-22925 curl: TELNET stack contents disclosure again
TELNET stack contents disclosure again ====================================== Project curl Security Advisory, July 21st 2021 - [Permalink](https://curl.se/docs/CVE-2021-22925.html) VULNERABILITY ------------- curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl. This rarely used option is used to send variable=content pairs to TELNET servers. Due to flaw in the option parser for sending `NEW_ENV` variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server. Therefore potentially revealing sensitive internal information to the server using a clear-text network protocol. This could happen because curl did not call and use sscanf() correctly when parsing the string provided by the application. The previous curl security vulnerability [CVE-2021-22898](https://curl.se/docs/CVE-2021-22898.html) is almost identical to this one but the fix was insufficient so this security vulnerability remained. We are not aware of any exploit of this flaw. INFO ---- This flaw has existed in curl since commit [a1d6ad2610](https://github.com/curl/curl/commit/a1d6ad2610) in libcurl 7.7, released on March 22, 2001. There was a previous attempt to fix this issue in curl 7.77.0 but it was not done proper. The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2021-22925 to this issue. CWE-457: Use of Uninitialized Variable Severity: Medium AFFECTED VERSIONS ----------------- - Affected versions: curl 7.7 to and including 7.77.0 - Not affected versions: curl < 7.7 and curl >= 7.78.0 Also note that libcurl is used by many applications, and not always advertised as such. THE SOLUTION ------------ Use sscanf() properly and only use properly filled-in buffers. A [fix for CVE-2021-22925](https://github.com/curl/curl/commit/894f6ec730597eb243618d33cc84d71add8d6a8a) RECOMMENDATIONS -------------- A - Upgrade curl to version 7.78.0 B - Apply the patch to your local version C - Avoid using `CURLOPT_TELNETOPTIONS` TIMELINE -------- This issue was reported to the curl project on June 11, 2021. This advisory was posted on July 21, 2021. CREDITS ------- This issue was reported and patched by Red Hat Product Security. Thanks a lot!
NOTE: This is a new vulnerability caused by the previous cURL release's vulnerability fix for CVE-2021-22898.
[edit to include the title]
comment:6 by , 4 years ago
CVE-2021-22926 curl: CURLOPT_SSLCERT mixup with Secure Transport
CURLOPT_SSLCERT mixup with Secure Transport =========================================== Project curl Security Advisory, July 21st 2021 - [Permalink](https://curl.se/docs/CVE-2021-22926.html) VULNERABILITY ------------- libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the `CURLOPT_SSLCERT` option (`--cert` with the command line tool). When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name. If the appliction runs with a current working directory that is writable by other users (like `/tmp`), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake. We are not aware of any exploit of this flaw. INFO ---- This flaw has existed in curl since commit [d2fe616e7e](https://github.com/curl/curl/commit/d2fe616e7e) in libcurl 7.33.0, released on October 14, 2013. The fixed libcurl version will now instead first check for a certificate in the key chain using the specified name and only if one does not exist, it will check for a file name. The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2021-22926 to this issue. CWE-295: Improper Certificate Validation Severity: Medium AFFECTED VERSIONS ----------------- Using libcurl on macOS built to use Secure Transport. - Affected versions: curl 7.33.0 to and including 7.77.0 - Not affected versions: curl < 7.33.0 and curl >= 7.78.0 Also note that libcurl is used by many applications, and not always advertised as such. THE SOLUTION ------------ File names used in this option must contain at least one slash. A [fix for CVE-2021-22926](https://github.com/curl/curl/commit/fd9b40bf8dfd43edcbc0d254d613d95a11061c05) RECOMMENDATIONS -------------- A - Upgrade curl to version 7.78.0 B - Apply the patch to your local version C - Do now run your application in directories where other users can inject files. TIMELINE -------- This issue was reported to the curl project on June 15, 2021. This advisory was posted on July 21, 2021. CREDITS ------- This issue was reported by Harry Sintonen. Patched by Daniel Stenberg. Thanks a lot!
comment:7 by , 4 years ago
Owner: | changed from | to
---|---|
Status: | new → assigned |
Note:
See TracTickets
for help on using tickets.