You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.
mend-for-github-combot
changed the title
CVE-2023-27536 (Medium) detected in curlcurl-7_69_1, curlcurl-7_69_1
CVE-2023-27536 (Medium) detected in curlcurl-7_69_1, curlcurl-7_69_1 - autoclosed
Aug 23, 2023
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
mend-for-github-combot
changed the title
CVE-2023-27536 (Medium) detected in curlcurl-7_69_1, curlcurl-7_69_1 - autoclosed
CVE-2023-27536 (Medium) detected in curlcurl-7_69_1, curlcurl-7_69_1
Oct 11, 2023
CVE-2023-27536 - Medium Severity Vulnerability
Vulnerable Libraries - curlcurl-7_69_1, curlcurl-7_69_1
Vulnerability Details
An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.
Publish Date: 2023-03-30
URL: CVE-2023-27536
CVSS 3 Score Details (5.9)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://seclists.org/oss-sec/2023/q1/177
Release Date: 2023-03-03
Fix Resolution: curl-8_0_0
The text was updated successfully, but these errors were encountered: