Cookie Injection Vulnerability in libcurl by cURL
CVE-2023-38546
3.7LOW
What is CVE-2023-38546?
A vulnerability exists in the libcurl library that enables attackers to inject arbitrary cookies into applications using the library. The issue arises when an application duplicates a handle using the curl_easy_duphandle function. If cookies are enabled and the original handle does not source cookies from a disk file, the cloned handle can erroneously reference a non-existent or improperly named file, such as 'none'. If a file by this name exists and is readable in the application's current working directory, it can lead to the inadvertent loading of sensitive cookies, potentially compromising user data and security.
Affected Version(s)
curl 8.4.0
curl 7.9.1
References
CVSS V3.1
Score:
3.7
Severity:
LOW
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved