[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2009-0037

Date: (C)2009-03-04   (M)2017-10-04
 
CVSS Score: 6.8Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.

Reference:
SECTRACK-1021783
http://www.securityfocus.com/archive/1/archive/1/501757/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/504849/100/0/threaded
BID-33962
SECUNIA-34138
SECUNIA-34202
SECUNIA-34237
SECUNIA-34251
SECUNIA-34255
SECUNIA-34259
SECUNIA-34399
SECUNIA-35766
ADV-2009-0581
ADV-2009-1865
APPLE-SA-2010-03-29-1
DSA-1738
GLSA-200903-21
IAVM:2012-B-0056
RHSA-2009:0341
SSA:2009-069-01
SUSE-SR:2009:006
USN-726-1
http://lists.vmware.com/pipermail/security-announce/2009/000060.html
curl-location-security-bypass(49030)
http://curl.haxx.se/docs/adv_20090303.html
http://curl.haxx.se/lxr/source/CHANGES
http://support.apple.com/kb/HT4077
http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0042
http://www.vmware.com/security/advisories/VMSA-2009-0009.html
http://www.withdk.com/2009/03/03/curllibcurl-redirect-arbitrary-file-access/
http://www.withdk.com/archives/Libcurl_arbitrary_file_access.pdf

CWE    1
CWE-352
OVAL    17
oval:org.secpod.oval:def:200373
oval:org.secpod.oval:def:500686
oval:org.secpod.oval:def:200368
oval:org.secpod.oval:def:200248
...

© 2013 SecPod Technologies