7.8

CVE-2020-8177

Exploit

curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.

Data is provided by the National Vulnerability Database (NVD)
HaxxCurl Version >= 7.20.0 <= 7.70.0
DebianDebian Linux Version10.0
FujitsuM10-1 Firmware Version < xcp2410
   FujitsuM10-1 Version-
FujitsuM10-4 Firmware Version < xcp2410
   FujitsuM10-4 Version-
FujitsuM10-4s Firmware Version < xcp2410
   FujitsuM10-4s Version-
FujitsuM12-1 Firmware Version < xcp2410
   FujitsuM12-1 Version-
FujitsuM12-2 Firmware Version < xcp2410
   FujitsuM12-2 Version-
FujitsuM12-2s Firmware Version < xcp2410
   FujitsuM12-2s Version-
FujitsuM10-1 Firmware Version < xcp3110
   FujitsuM10-1 Version-
FujitsuM10-4 Firmware Version < xcp3110
   FujitsuM10-4 Version-
FujitsuM10-4s Firmware Version < xcp3110
   FujitsuM10-4s Version-
FujitsuM12-1 Firmware Version < xcp3110
   FujitsuM12-1 Version-
FujitsuM12-2 Firmware Version < xcp3110
   FujitsuM12-2 Version-
FujitsuM12-2s Firmware Version < xcp3110
   FujitsuM12-2s Version-
SplunkUniversal Forwarder Version >= 8.2.0 < 8.2.12
SplunkUniversal Forwarder Version >= 9.0.0 < 9.0.6
SplunkUniversal Forwarder Version9.1.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.04
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 4.6 3.9 6.4
AV:L/AC:L/Au:N/C:P/I:P/A:P
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

CWE-99 Improper Control of Resource Identifiers ('Resource Injection')

The product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control.