curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.
The product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Curl | Haxx | 7.20.0 (including) | 7.70.0 (including) |
Red Hat Enterprise Linux 7 | RedHat | curl-0:7.29.0-59.el7_9.1 | * |
Red Hat Enterprise Linux 8 | RedHat | curl-0:7.61.1-14.el8 | * |
Red Hat Enterprise Linux 8.2 Extended Update Support | RedHat | curl-0:7.61.1-12.el8_2.2 | * |
Red Hat OpenShift Do | RedHat | openshiftdo/odo-init-image-rhel7:1.1.3-2 | * |
Curl | Ubuntu | bionic | * |
Curl | Ubuntu | devel | * |
Curl | Ubuntu | eoan | * |
Curl | Ubuntu | esm-infra-legacy/trusty | * |
Curl | Ubuntu | esm-infra/bionic | * |
Curl | Ubuntu | esm-infra/focal | * |
Curl | Ubuntu | esm-infra/xenial | * |
Curl | Ubuntu | focal | * |
Curl | Ubuntu | trusty | * |
Curl | Ubuntu | trusty/esm | * |
Curl | Ubuntu | xenial | * |
A resource injection issue occurs when the following two conditions are met:
This may enable an attacker to access or modify otherwise protected system resources.