CVE Vulnerabilities

CVE-2023-27535

Authentication Bypass by Primary Weakness

Published: Mar 30, 2023 | Modified: Jun 09, 2025
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
5.9 MODERATE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.

Weakness

The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.

Affected Software

NameVendorStart VersionEnd Version
LibcurlHaxx7.13.0 (including)7.88.1 (including)
Red Hat Enterprise Linux 8RedHatcurl-0:7.61.1-30.el8_8.2*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatcurl-0:7.61.1-22.el8_6.12*
Red Hat Enterprise Linux 9RedHatcurl-0:7.76.1-23.el9_2.1*
Red Hat Enterprise Linux 9RedHatcurl-0:7.76.1-23.el9_2.1*
CurlUbuntubionic*
CurlUbuntuesm-infra-legacy/trusty*
CurlUbuntuesm-infra/bionic*
CurlUbuntuesm-infra/focal*
CurlUbuntuesm-infra/xenial*
CurlUbuntufocal*
CurlUbuntujammy*
CurlUbuntukinetic*
CurlUbuntulunar*
CurlUbuntutrusty*
CurlUbuntutrusty/esm*
CurlUbuntuupstream*
CurlUbuntuxenial*

References