Related Vulnerabilities: CVE-2021-22876  

libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request. libcurl automatically sets the Referer: HTTP request header field in outgoing HTTP requests if the CURLOPT_AUTOREFERER option is set. With the curl tool, it is enabled with --referer ";auto". The issue has existed in libcurl since version 7.1.1 and is fixed in version 7.76.0.

Severity Medium

Remote Yes

Type Information disclosure

Description

libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.

libcurl automatically sets the Referer: HTTP request header field in outgoing HTTP requests if the CURLOPT_AUTOREFERER option is set. With the curl tool, it is enabled with --referer ";auto".

The issue has existed in libcurl since version 7.1.1 and is fixed in version 7.76.0.

AVG-1758 lib32-libcurl-gnutls 7.75.0-1 Medium Vulnerable

AVG-1757 libcurl-gnutls 7.75.0-1 Medium Vulnerable

AVG-1756 lib32-libcurl-compat 7.75.0-1 High Vulnerable

AVG-1755 libcurl-compat 7.75.0-1 High Vulnerable

AVG-1754 lib32-curl 7.75.0-1 High Vulnerable

AVG-1753 curl 7.75.0-1 High Vulnerable

https://curl.se/docs/CVE-2021-22876.html
https://github.com/curl/curl/commit/7214288898f5625a6cc196e22a74232eada7861c

Workaround
==========

The issue can be mitigated by providing the credentials with -u or CURLOPT_USERPWD, or by avoiding ACURLOPT_AUTOREFERER and --referer ";auto".