CVE Vulnerabilities

CVE-2023-27535

Improper Authentication

Published: Mar 30, 2023 | Modified: Mar 27, 2024
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
5.9 MODERATE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Ubuntu
MEDIUM

An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

Name Vendor Start Version End Version
Libcurl Haxx 7.13.0 (including) 7.88.1 (including)
Red Hat Enterprise Linux 8 RedHat curl-0:7.61.1-30.el8_8.2 *
Red Hat Enterprise Linux 8.6 Extended Update Support RedHat curl-0:7.61.1-22.el8_6.12 *
Red Hat Enterprise Linux 9 RedHat curl-0:7.76.1-23.el9_2.1 *
Red Hat Enterprise Linux 9 RedHat curl-0:7.76.1-23.el9_2.1 *
Curl Ubuntu bionic *
Curl Ubuntu esm-infra/xenial *
Curl Ubuntu focal *
Curl Ubuntu jammy *
Curl Ubuntu kinetic *
Curl Ubuntu lunar *
Curl Ubuntu trusty *
Curl Ubuntu trusty/esm *
Curl Ubuntu upstream *
Curl Ubuntu xenial *

Potential Mitigations

References