CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
30.9%
This flaw allows a malicious HTTP server to set “super cookies” in curl that
are then passed back to more origins than what is otherwise allowed or
possible. This allows a site to set cookies that then would get sent to
different and unrelated sites and domains.
It could do this by exploiting a mixed case flaw in curl’s function that
verifies a given cookie domain against the Public Suffix List (PSL). For
example a cookie could be set with domain=co.UK
when the URL used a lower
case hostname curl.co.uk
, even though co.uk
is listed as a PSL domain.
[
{
"vendor": "curl",
"product": "curl",
"versions": [
{
"version": "8.4.0",
"status": "affected",
"lessThanOrEqual": "8.4.0",
"versionType": "semver"
},
{
"version": "7.46.0",
"status": "unaffected",
"lessThan": "7.46.0",
"versionType": "semver"
}
]
}
]
curl.se/docs/CVE-2023-46218.html
hackerone.com/reports/2212193
lists.debian.org/debian-lts-announce/2023/12/msg00015.html
lists.fedoraproject.org/archives/list/[email protected]/message/3ZX3VW67N4ACRAPMV2QS2LVYGD7H2MVE/
lists.fedoraproject.org/archives/list/[email protected]/message/UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD/
security.netapp.com/advisory/ntap-20240125-0007/
www.debian.org/security/2023/dsa-5587
More