Information disclosure in curl (Alpine package)



Published: 2013-04-12
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2013-1944
CWE-ID CWE-200
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
curl (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Information disclosure

EUVDB-ID: #VU33107

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2013-1944

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL. Per http://www.ubuntu.com/usn/USN-1801-1/ "A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 12.10 Ubuntu 12.04 LTS Ubuntu 11.10 Ubuntu 10.04 LTS Ubuntu 8.04 LTS"

Mitigation

Install update from vendor's website.

Vulnerable software versions

curl (Alpine package): 7.19.6-r0 - 7.24.0-r0

External links

http://git.alpinelinux.org/aports/commit/?id=2fbed140ab34226826cb7dc379e90c1031a445b2
http://git.alpinelinux.org/aports/commit/?id=49d3fd314ba9d8c167619b369f91c522e1362a79
http://git.alpinelinux.org/aports/commit/?id=d3000ca276c8bfbf8c074afed284de427aae83b9
http://git.alpinelinux.org/aports/commit/?id=e732f7b6f180b5ecd0819d576d8603bb5bb10dd3


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###