CVE Vulnerabilities

CVE-2023-27536

Authentication Bypass by Primary Weakness

Published: Mar 30, 2023 | Modified: Feb 14, 2025
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
5.9 MODERATE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.

Weakness

The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.

Affected Software

NameVendorStart VersionEnd Version
LibcurlHaxx7.22.0 (including)7.88.1 (including)
Red Hat Enterprise Linux 8RedHatcurl-0:7.61.1-30.el8_8.3*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatcurl-0:7.61.1-22.el8_6.12*
Red Hat Enterprise Linux 9RedHatcurl-0:7.76.1-26.el9*
Red Hat Enterprise Linux 9RedHatcurl-0:7.76.1-26.el9*
CurlUbuntubionic*
CurlUbuntuesm-infra-legacy/trusty*
CurlUbuntuesm-infra/bionic*
CurlUbuntuesm-infra/focal*
CurlUbuntuesm-infra/xenial*
CurlUbuntufocal*
CurlUbuntujammy*
CurlUbuntukinetic*
CurlUbuntulunar*
CurlUbuntutrusty*
CurlUbuntutrusty/esm*
CurlUbuntuupstream*
CurlUbuntuxenial*

References