|
|
Subscribe / Log in / New account

curl: data injection

Package(s):curl CVE #(s):CVE-2012-0036
Created:January 30, 2012 Updated:April 13, 2012
Description: From the Red Hat bugzilla:

libcurl is vulnerable to a data injection attack for certain protocols through control characters embedded or percent-encoded in URLs.

When parsing URLs, libcurl's parser is very laxed and liberal and only parses as little as possible and lets as much as possible through as long as it can figure out what to do.

In the specific process when libcurl extracts the file path part from a given URL, it didn't always verify the data or escape control characters properly before it passed the file path on to the protocol-specific code that then would use it for its protocol business.

This passing through of control characters could be exploited by someone who would be able to pass in a handicrafted URL to libcurl. Lots of libcurl using applications let users enter URLs in one form or another and not all of these check the input carefully to prevent malicious ones.

A malicious user might pass in %0d%0a to get treated as CR LF by libcurl, and by using this fact a user can trick for example a POP3 client to delete a message instead of getting it or trick an SMTP server to send an unintended message.

This vulnerability can be used to fool libcurl with the following protocols: IMAP, POP3 and SMTP.

This flaw only affects curl versions 7.20.0 up to and including 7.23.1 It is corrected in 7.24.0

Alerts:
Mandriva MDVSA-2012:058 curl 2012-04-13
Gentoo 201203-02 curl 2012-03-05
Fedora FEDORA-2012-0888 curl 2012-02-11
openSUSE openSUSE-SU-2012:0229-1 curl 2012-02-09
Debian DSA-2398-1 curl 2012-01-30
Fedora FEDORA-2012-0894 curl 2012-01-28

to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds