A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.
The product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Curl | Haxx | * | 7.51.0 (excluding) |
Red Hat JBoss Core Services 1 | RedHat | curl | * |
Red Hat Software Collections for Red Hat Enterprise Linux 6 | RedHat | httpd24-curl-0:7.61.1-1.el6 | * |
Red Hat Software Collections for Red Hat Enterprise Linux 6 | RedHat | httpd24-httpd-0:2.4.34-7.el6 | * |
Red Hat Software Collections for Red Hat Enterprise Linux 6 | RedHat | httpd24-nghttp2-0:1.7.1-7.el6 | * |
Red Hat Software Collections for Red Hat Enterprise Linux 7 | RedHat | httpd24-curl-0:7.61.1-1.el7 | * |
Red Hat Software Collections for Red Hat Enterprise Linux 7 | RedHat | httpd24-httpd-0:2.4.34-7.el7 | * |
Red Hat Software Collections for Red Hat Enterprise Linux 7 | RedHat | httpd24-nghttp2-0:1.7.1-7.el7 | * |
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS | RedHat | httpd24-curl-0:7.61.1-1.el7 | * |
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS | RedHat | httpd24-httpd-0:2.4.34-7.el7 | * |
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS | RedHat | httpd24-nghttp2-0:1.7.1-7.el7 | * |
Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS | RedHat | httpd24-curl-0:7.61.1-1.el7 | * |
Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS | RedHat | httpd24-httpd-0:2.4.34-7.el7 | * |
Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS | RedHat | httpd24-nghttp2-0:1.7.1-7.el7 | * |
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS | RedHat | httpd24-curl-0:7.61.1-1.el7 | * |
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS | RedHat | httpd24-httpd-0:2.4.34-7.el7 | * |
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS | RedHat | httpd24-nghttp2-0:1.7.1-7.el7 | * |
Curl | Ubuntu | devel | * |
Curl | Ubuntu | precise | * |
Curl | Ubuntu | trusty | * |
Curl | Ubuntu | upstream | * |
Curl | Ubuntu | vivid/stable-phone-overlay | * |
Curl | Ubuntu | vivid/ubuntu-core | * |
Curl | Ubuntu | xenial | * |
Curl | Ubuntu | yakkety | * |
Curl | Ubuntu | zesty | * |
A resource injection issue occurs when the following two conditions are met:
This may enable an attacker to access or modify otherwise protected system resources.