Vulnerability CVE-2023-27534: Information

Description

A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.

Severity: HIGH (8.8) Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Published: March 30, 2023
Modified: March 27, 2024
Error type identifier: CWE-22

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
curlsisyphus8.0.0-alt18.7.1-alt2ALT-PU-2023-1475-1317011Fixed
curlsisyphus_e2k8.0.0-alt18.7.1-alt2ALT-PU-2023-2920-1-Fixed
curlsisyphus_riscv648.0.1-alt18.7.1-alt2ALT-PU-2023-2904-1-Fixed
curlp108.0.1-alt18.7.1-alt1ALT-PU-2023-1501-1317014Fixed
curlp10_e2k8.0.1-alt18.7.1-alt1ALT-PU-2023-2950-1-Fixed
curlc10f18.0.1-alt18.6.0-alt1ALT-PU-2023-1501-1317014Fixed
curlc9f28.3.0-alt18.6.0-alt1ALT-PU-2023-5727-4329877Fixed

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://hackerone.com/reports/1892351
  • Exploit
  • Third Party Advisory
https://security.netapp.com/advisory/ntap-20230420-0012/
  • Third Party Advisory
GLSA-202310-12
  • Third Party Advisory
FEDORA-2023-7e7414e64d
  • Mailing List
  • Third Party Advisory
[debian-lts-announce] 20240317 [SECURITY] [DLA 3763-1] curl security update
  • Mailing List
  • Third Party Advisory
    1. Configuration 1

      cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
      Start including
      7.18.0
      End including
      7.88.1

      Configuration 2

      cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*

      Configuration 3

      cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*

      cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*

      Configuration 4

      cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*

      Configuration 5

      cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*

      Configuration 6

      cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*

      Configuration 7

      cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*

      Configuration 8

      cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*

      cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*
      Start including
      9.0.0
      End excliding
      9.0.6

      cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*
      Start including
      8.2.0
      End excliding
      8.2.12