跳转到帖子

Rocky Linux: CVE-2023-46218: curl (RLSA-2024-1601)

recommended_posts

发布于
  • Members

Rocky Linux: CVE-2023-46218: curl (RLSA-2024-1601)

Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:N)
Published
12/07/2023
Created
04/09/2024
Added
04/08/2024
Modified
01/30/2025

Description

This flaw allows a malicious HTTP server to set "super cookies" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl's function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.

Solution(s)

  • rocky-upgrade-curl
  • rocky-upgrade-curl-debuginfo
  • rocky-upgrade-curl-debugsource
  • rocky-upgrade-libcurl
  • rocky-upgrade-libcurl-debuginfo
  • rocky-upgrade-libcurl-devel
  • rocky-upgrade-libcurl-minimal
  • rocky-upgrade-libcurl-minimal-debuginfo

References

  • https://attackerkb.com/topics/cve-2023-46218
  • CVE - 2023-46218
  • https://errata.rockylinux.org/RLSA-2024:1601
  • 查看数 707
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…