3.1

CVE-2021-22898

Exploit

curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.

Data is provided by the National Vulnerability Database (NVD)
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.13% 0.326
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 3.1 1.6 1.4
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
nvd@nist.gov 2.6 4.9 2.9
AV:N/AC:H/Au:N/C:P/I:N/A:N
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

CWE-909 Missing Initialization of Resource

The product does not initialize a critical resource.

http://www.openwall.com/lists/oss-security/2021/07/21/4
Patch
Third Party Advisory
Mailing List
https://curl.se/docs/CVE-2021-22898.html
Patch
Vendor Advisory
Exploit
https://hackerone.com/reports/1176461
Patch
Third Party Advisory
Exploit
Issue Tracking