Vulnerability CVE-2023-27536: Information

Description

An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.

Severity: MEDIUM (5.9) Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Published: March 30, 2023
Modified: March 27, 2024
Error type identifier: CWE-287

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
curlsisyphus8.0.0-alt18.7.1-alt2ALT-PU-2023-1475-1317011Fixed
curlsisyphus_e2k8.0.0-alt18.7.1-alt2ALT-PU-2023-2920-1-Fixed
curlsisyphus_riscv648.0.1-alt18.7.1-alt2ALT-PU-2023-2904-1-Fixed
curlp108.0.1-alt18.7.1-alt1ALT-PU-2023-1501-1317014Fixed
curlp10_e2k8.0.1-alt18.7.1-alt1ALT-PU-2023-2950-1-Fixed
curlc10f18.0.1-alt18.6.0-alt1ALT-PU-2023-1501-1317014Fixed
curlc9f28.3.0-alt18.6.0-alt1ALT-PU-2023-5727-4329877Fixed

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://hackerone.com/reports/1895135
  • Exploit
  • Third Party Advisory
https://security.netapp.com/advisory/ntap-20230420-0010/
  • Third Party Advisory
[debian-lts-announce] 20230421 [SECURITY] [DLA 3398-1] curl security update
  • Mailing List
  • Third Party Advisory
GLSA-202310-12
  • Third Party Advisory
FEDORA-2023-7e7414e64d
  • Mailing List
  • Third Party Advisory
    1. Configuration 1

      cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
      Start including
      7.22.0
      End including
      7.88.1

      Configuration 2

      cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*

      Configuration 3

      cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

      Configuration 4

      cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*

      Configuration 5

      cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*

      Configuration 6

      cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*

      Configuration 7

      cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*

      Configuration 8

      cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*

      Configuration 9

      cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*

      Configuration 10

      cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*

      cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*
      Start including
      9.0.0
      End excliding
      9.0.6

      cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*
      Start including
      8.2.0
      End excliding
      8.2.12