A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.
References
Link | Resource |
---|---|
https://hackerone.com/reports/1892351 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2024/03/msg00016.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/ | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202310-12 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20230420-0012/ | Third Party Advisory |
https://hackerone.com/reports/1892351 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2024/03/msg00016.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/ | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202310-12 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20230420-0012/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
|
History
21 Nov 2024, 07:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://hackerone.com/reports/1892351 - Exploit, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2024/03/msg00016.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/ - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202310-12 - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20230420-0012/ - Third Party Advisory |
27 Mar 2024, 14:54
Type | Values Removed | Values Added |
---|---|---|
First Time |
Splunk
Splunk universal Forwarder |
|
CPE | cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:* cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:* |
|
References | () https://lists.debian.org/debian-lts-announce/2024/03/msg00016.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/ - Mailing List, Third Party Advisory |
17 Mar 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Nov 2023, 04:09
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
20 Oct 2023, 18:45
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* |
|
First Time |
Broadcom
Netapp Netapp active Iq Unified Manager Netapp h700s Netapp h410s Firmware Fedoraproject Fedoraproject fedora Netapp h300s Firmware Netapp h500s Firmware Netapp h410s Netapp h700s Firmware Broadcom brocade Fabric Operating System Firmware Netapp h500s Netapp h300s |
|
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20230420-0012/ - Third Party Advisory | |
References | (GENTOO) https://security.gentoo.org/glsa/202310-12 - Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/ - Mailing List |
11 Oct 2023, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Apr 2023, 09:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Apr 2023, 04:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Apr 2023, 16:23
Type | Values Removed | Values Added |
---|---|---|
First Time |
Haxx curl
Haxx |
|
CWE | CWE-22 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | (MISC) https://hackerone.com/reports/1892351 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:* |
30 Mar 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-30 20:15
Updated : 2025-04-23 17:16
NVD link : CVE-2023-27534
Mitre link : CVE-2023-27534
CVE.ORG link : CVE-2023-27534
JSON object : View
Products Affected
splunk
- universal_forwarder
fedoraproject
- fedora
haxx
- curl
netapp
- active_iq_unified_manager
- h700s_firmware
- h300s
- h300s_firmware
- h500s_firmware
- h410s_firmware
- h500s
- h410s
- h700s
broadcom
- brocade_fabric_operating_system_firmware
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')