5
CVSSv2

CVE-2014-3613

Published: 18/11/2014 Updated: 05/01/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

cURL and libcurl prior to 7.38.0 does not properly handle IP addresses in cookie domain names, which allows remote malicious users to set cookies for or send arbitrary cookies to certain sites, as demonstrated by a site at 192.168.0.1 setting cookies for a site at 127.168.0.1.

Vulnerable Product Search on Vulmon Subscribe to Product

haxx curl 7.33.0

haxx curl 7.34.0

haxx curl 7.37.0

haxx curl

haxx curl 7.31.0

haxx curl 7.32.0

haxx curl 7.35.0

haxx curl 7.36.0

haxx libcurl 7.37.0

haxx libcurl 7.36.0

haxx libcurl 7.33.0

haxx libcurl 7.32.0

haxx libcurl

haxx libcurl 7.31.0

haxx libcurl 7.35.0

haxx libcurl 7.34.0

apple mac os x

Vendor Advisories

Synopsis Moderate: curl security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic Updated curl packages that fix multiple security issues, several bugs, andadd two enhancements are now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as ...
Several security issues were fixed in curl ...
Two vulnerabilities have been discovered in cURL, an URL transfer library They can be use to leak cookie information: CVE-2014-3613 By not detecting and rejecting domain names for partial literal IP addresses properly when parsing received HTTP cookies, libcurl can be fooled to both sending cookies to wrong sites and into allowing ...
libcurl wrongly allows cookies to be set for TLDs, thus making them much broader then they are supposed to be allowed to This can allow arbitrary sites to set cookies that then would get sent to a different and unrelated site or domain By not detecting and rejecting domain names for partial literal IP addresses properly when parsing received HTTP ...
It was found that the libcurl library did not correctly handle partial literal IP addresses when parsing received HTTP cookies An attacker able to trick a user into connecting to a malicious server could use this flaw to set the user's cookie to a crafted domain, making other cookie-related issues easier to exploit ...