Haxx

Curl

134 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.2%
  • Veröffentlicht 09.02.2023 20:15:10
  • Zuletzt bearbeitet 21.11.2024 07:26:46

A use after free vulnerability exists in curl <7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific pr...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 23.12.2022 15:15:15
  • Zuletzt bearbeitet 13.02.2026 20:16:13

A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the U...

Exploit
  • EPSS 2.59%
  • Veröffentlicht 05.12.2022 22:15:10
  • Zuletzt bearbeitet 13.02.2026 20:16:13

When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request wh...

Exploit
  • EPSS 0.18%
  • Veröffentlicht 05.12.2022 22:15:10
  • Zuletzt bearbeitet 21.11.2024 07:10:59

curl can be told to parse a `.netrc` file for credentials. If that file endsin a line with 4095 consecutive non-white space letters and no newline, curlwould first read past the end of the stack-based buffer, and if the readworks, write a zero byte b...

  • EPSS 0.63%
  • Veröffentlicht 29.10.2022 20:15:09
  • Zuletzt bearbeitet 07.05.2025 14:15:33

curl before 7.86.0 has a double free. If curl is told to use an HTTP proxy for a transfer with a non-HTTP(S) URL, it sets up the connection to the remote server by issuing a CONNECT request to the proxy, and then tunnels the rest of the protocol thro...

  • EPSS 0.12%
  • Veröffentlicht 29.10.2022 02:15:09
  • Zuletzt bearbeitet 13.02.2026 20:16:13

In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL....

Exploit
  • EPSS 0.21%
  • Veröffentlicht 23.09.2022 14:15:12
  • Zuletzt bearbeitet 05.05.2025 17:18:16

When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service...

Exploit
  • EPSS 2.59%
  • Veröffentlicht 07.07.2022 13:15:08
  • Zuletzt bearbeitet 05.05.2025 17:18:12

A malicious server can serve excessive amounts of `Set-Cookie:` headers in a HTTP response to curl and curl < 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the...

Exploit
  • EPSS 4.55%
  • Veröffentlicht 07.07.2022 13:15:08
  • Zuletzt bearbeitet 05.05.2025 17:18:13

curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allo...

Exploit
  • EPSS 0.2%
  • Veröffentlicht 07.07.2022 13:15:08
  • Zuletzt bearbeitet 23.04.2025 18:15:53

When curl < 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen...