Computer Security
[EN] securityvulns.ru no-pyccku


curl protection bypass
Published:04.03.2009
Source:
SecurityVulns ID:9710
Type:client
Threat Level:
4/10
Description:Access restrictons can be bypassed with redirections.
Affected:CURL : curl 7.15
 CURL : libcurl 7.15
CVE:CVE-2009-0037 (The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.)
Original documentdocumentUBUNTU, [USN-726-1] curl vulnerability (04.03.2009)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod