curl 7.1.1 to and including 7.75.0 is vulnerable to an Exposure of Private Personal Information to an Unauthorized Actor by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.
The product does not properly prevent a person’s private, personal information from being accessed by actors who either (1) are not explicitly authorized to access the information or (2) do not have the implicit consent of the person about whom the information is collected.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Libcurl | Haxx | 7.1.1 (including) | 7.75.0 (including) |
JBoss Core Services Apache HTTP Server 2.4.37 SP8 | RedHat | curl | * |
JBoss Core Services for RHEL 8 | RedHat | jbcs-httpd24-0:1-18.el8jbcs | * |
JBoss Core Services for RHEL 8 | RedHat | jbcs-httpd24-apr-0:1.6.3-105.el8jbcs | * |
JBoss Core Services for RHEL 8 | RedHat | jbcs-httpd24-apr-util-0:1.6.1-82.el8jbcs | * |
JBoss Core Services for RHEL 8 | RedHat | jbcs-httpd24-brotli-0:1.0.6-40.el8jbcs | * |
JBoss Core Services for RHEL 8 | RedHat | jbcs-httpd24-curl-0:7.77.0-2.el8jbcs | * |
JBoss Core Services for RHEL 8 | RedHat | jbcs-httpd24-httpd-0:2.4.37-74.el8jbcs | * |
JBoss Core Services for RHEL 8 | RedHat | jbcs-httpd24-jansson-0:2.11-55.el8jbcs | * |
JBoss Core Services for RHEL 8 | RedHat | jbcs-httpd24-mod_cluster-native-0:1.3.16-5.Final_redhat_2.el8jbcs | * |
JBoss Core Services for RHEL 8 | RedHat | jbcs-httpd24-mod_http2-0:1.15.7-17.el8jbcs | * |
JBoss Core Services for RHEL 8 | RedHat | jbcs-httpd24-mod_jk-0:1.2.48-16.redhat_1.el8jbcs | * |
JBoss Core Services for RHEL 8 | RedHat | jbcs-httpd24-mod_md-1:2.0.8-36.el8jbcs | * |
JBoss Core Services for RHEL 8 | RedHat | jbcs-httpd24-mod_security-0:2.9.2-63.GA.el8jbcs | * |
JBoss Core Services for RHEL 8 | RedHat | jbcs-httpd24-nghttp2-0:1.39.2-37.el8jbcs | * |
JBoss Core Services for RHEL 8 | RedHat | jbcs-httpd24-openssl-1:1.1.1g-6.el8jbcs | * |
JBoss Core Services for RHEL 8 | RedHat | jbcs-httpd24-openssl-chil-0:1.0.0-5.el8jbcs | * |
JBoss Core Services for RHEL 8 | RedHat | jbcs-httpd24-openssl-pkcs11-0:0.4.10-20.el8jbcs | * |
JBoss Core Services on RHEL 7 | RedHat | jbcs-httpd24-0:1-18.jbcs.el7 | * |
JBoss Core Services on RHEL 7 | RedHat | jbcs-httpd24-apr-0:1.6.3-105.jbcs.el7 | * |
JBoss Core Services on RHEL 7 | RedHat | jbcs-httpd24-apr-util-0:1.6.1-82.jbcs.el7 | * |
JBoss Core Services on RHEL 7 | RedHat | jbcs-httpd24-curl-0:7.77.0-2.jbcs.el7 | * |
JBoss Core Services on RHEL 7 | RedHat | jbcs-httpd24-httpd-0:2.4.37-74.jbcs.el7 | * |
JBoss Core Services on RHEL 7 | RedHat | jbcs-httpd24-jansson-0:2.11-55.jbcs.el7 | * |
JBoss Core Services on RHEL 7 | RedHat | jbcs-httpd24-mod_cluster-native-0:1.3.16-5.Final_redhat_2.jbcs.el7 | * |
JBoss Core Services on RHEL 7 | RedHat | jbcs-httpd24-mod_http2-0:1.15.7-17.jbcs.el7 | * |
JBoss Core Services on RHEL 7 | RedHat | jbcs-httpd24-mod_jk-0:1.2.48-16.redhat_1.jbcs.el7 | * |
JBoss Core Services on RHEL 7 | RedHat | jbcs-httpd24-mod_md-1:2.0.8-36.jbcs.el7 | * |
JBoss Core Services on RHEL 7 | RedHat | jbcs-httpd24-mod_security-0:2.9.2-63.GA.jbcs.el7 | * |
.NET Core on Red Hat Enterprise Linux | RedHat | rh-dotnet31-curl-0:7.61.1-22.el7_9 | * |
Red Hat Enterprise Linux 8 | RedHat | curl-0:7.61.1-22.el8 | * |
Curl | Ubuntu | bionic | * |
Curl | Ubuntu | devel | * |
Curl | Ubuntu | focal | * |
Curl | Ubuntu | groovy | * |
Curl | Ubuntu | hirsute | * |
Curl | Ubuntu | precise/esm | * |
Curl | Ubuntu | trusty | * |
Curl | Ubuntu | trusty/esm | * |
Curl | Ubuntu | xenial | * |
There are many types of sensitive information that products must protect from attackers, including system data, communications, configuration, business secrets, intellectual property, and an individual’s personal (private) information. Private personal information may include a password, phone number, geographic location, personal messages, credit card number, etc. Private information is important to consider whether the person is a user of the product, or part of a data set that is processed by the product. An exposure of private information does not necessarily prevent the product from working properly, and in fact the exposure might be intended by the developer, e.g. as part of data sharing with other organizations. However, the exposure of personal private information can still be undesirable or explicitly prohibited by law or regulation. Some types of private information include:
Some of this information may be characterized as PII (Personally Identifiable Information), Protected Health Information (PHI), etc. Categories of private information may overlap or vary based on the intended usage or the policies and practices of a particular industry. Sometimes data that is not labeled as private can have a privacy implication in a different context. For example, student identification numbers are usually not considered private because there is no explicit and publicly-available mapping to an individual student’s personal information. However, if a school generates identification numbers based on student social security numbers, then the identification numbers should be considered private.