Lucene search

K
nvd[email protected]NVD:CVE-2013-1944
HistoryApr 29, 2013 - 10:55 p.m.

CVE-2013-1944

2013-04-2922:55:08
CWE-200
web.nvd.nist.gov
2

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

9.3 High

AI Score

Confidence

High

0.008 Low

EPSS

Percentile

81.2%

The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL.

Affected configurations

NVD
Node
haxxcurlRange7.29.0
OR
haxxcurlMatch6.0
OR
haxxcurlMatch6.1
OR
haxxcurlMatch6.1beta
OR
haxxcurlMatch6.2
OR
haxxcurlMatch6.3
OR
haxxcurlMatch6.3.1
OR
haxxcurlMatch6.4
OR
haxxcurlMatch6.5
OR
haxxcurlMatch6.5.1
OR
haxxcurlMatch6.5.2
OR
haxxcurlMatch7.1
OR
haxxcurlMatch7.1.1
OR
haxxcurlMatch7.2
OR
haxxcurlMatch7.2.1
OR
haxxcurlMatch7.3
OR
haxxcurlMatch7.4
OR
haxxcurlMatch7.4.1
OR
haxxcurlMatch7.4.2
OR
haxxcurlMatch7.5.1
OR
haxxcurlMatch7.5.2
OR
haxxcurlMatch7.6
OR
haxxcurlMatch7.6.1
OR
haxxcurlMatch7.7
OR
haxxcurlMatch7.7.1
OR
haxxcurlMatch7.7.2
OR
haxxcurlMatch7.7.3
OR
haxxcurlMatch7.8
OR
haxxcurlMatch7.8.1
OR
haxxcurlMatch7.9
OR
haxxcurlMatch7.9.1
OR
haxxcurlMatch7.9.2
OR
haxxcurlMatch7.9.3
OR
haxxcurlMatch7.9.4
OR
haxxcurlMatch7.9.5
OR
haxxcurlMatch7.9.6
OR
haxxcurlMatch7.9.7
OR
haxxcurlMatch7.9.8
OR
haxxcurlMatch7.10
OR
haxxcurlMatch7.10.1
OR
haxxcurlMatch7.10.2
OR
haxxcurlMatch7.10.3
OR
haxxcurlMatch7.10.4
OR
haxxcurlMatch7.10.5
OR
haxxcurlMatch7.10.6
OR
haxxcurlMatch7.10.7
OR
haxxcurlMatch7.10.8
OR
haxxcurlMatch7.11.0
OR
haxxcurlMatch7.11.1
OR
haxxcurlMatch7.11.2
OR
haxxcurlMatch7.12.0
OR
haxxcurlMatch7.12.1
OR
haxxcurlMatch7.12.2
OR
haxxcurlMatch7.12.3
OR
haxxcurlMatch7.13.0
OR
haxxcurlMatch7.13.1
OR
haxxcurlMatch7.13.2
OR
haxxcurlMatch7.14.0
OR
haxxcurlMatch7.14.1
OR
haxxcurlMatch7.15.0
OR
haxxcurlMatch7.15.1
OR
haxxcurlMatch7.15.2
OR
haxxcurlMatch7.15.3
OR
haxxcurlMatch7.15.4
OR
haxxcurlMatch7.15.5
OR
haxxcurlMatch7.16.0
OR
haxxcurlMatch7.16.1
OR
haxxcurlMatch7.16.2
OR
haxxcurlMatch7.16.3
OR
haxxcurlMatch7.16.4
OR
haxxcurlMatch7.17.0
OR
haxxcurlMatch7.17.1
OR
haxxcurlMatch7.18.0
OR
haxxcurlMatch7.18.1
OR
haxxcurlMatch7.18.2
OR
haxxcurlMatch7.19.0
OR
haxxcurlMatch7.19.1
OR
haxxcurlMatch7.19.2
OR
haxxcurlMatch7.19.3
OR
haxxcurlMatch7.19.4
OR
haxxcurlMatch7.19.5
OR
haxxcurlMatch7.19.6
OR
haxxcurlMatch7.19.7
OR
haxxcurlMatch7.20.0
OR
haxxcurlMatch7.20.1
OR
haxxcurlMatch7.21.0
OR
haxxcurlMatch7.21.1
OR
haxxcurlMatch7.21.2
OR
haxxcurlMatch7.21.3
OR
haxxcurlMatch7.21.4
OR
haxxcurlMatch7.21.5
OR
haxxcurlMatch7.21.6
OR
haxxcurlMatch7.21.7
OR
haxxcurlMatch7.22.0
OR
haxxcurlMatch7.23.0
OR
haxxcurlMatch7.23.1
OR
haxxcurlMatch7.24.0
OR
haxxcurlMatch7.25.0
OR
haxxcurlMatch7.26.0
OR
haxxcurlMatch7.27.0
OR
haxxcurlMatch7.28.0
OR
haxxcurlMatch7.28.1
Node
haxxlibcurlRange7.29.0
OR
haxxlibcurlMatch7.14.0
OR
haxxlibcurlMatch7.14.1
OR
haxxlibcurlMatch7.15.0
OR
haxxlibcurlMatch7.15.1
OR
haxxlibcurlMatch7.15.2
OR
haxxlibcurlMatch7.15.3
OR
haxxlibcurlMatch7.15.4
OR
haxxlibcurlMatch7.15.5
OR
haxxlibcurlMatch7.16.0
OR
haxxlibcurlMatch7.16.2
OR
haxxlibcurlMatch7.16.3
OR
haxxlibcurlMatch7.16.4
OR
haxxlibcurlMatch7.17.0
OR
haxxlibcurlMatch7.17.1
OR
haxxlibcurlMatch7.18.0
OR
haxxlibcurlMatch7.18.2
OR
haxxlibcurlMatch7.19.3
OR
haxxlibcurlMatch7.20.0
OR
haxxlibcurlMatch7.21.2
OR
haxxlibcurlMatch7.22.0
OR
haxxlibcurlMatch7.23.0
OR
haxxlibcurlMatch7.28.0
OR
haxxlibcurlMatch7.28.1
Node
canonicalubuntu_linuxMatch8.04-lts
OR
canonicalubuntu_linuxMatch10.04-lts
OR
canonicalubuntu_linuxMatch11.10
OR
canonicalubuntu_linuxMatch12.04-lts
OR
canonicalubuntu_linuxMatch12.10

References

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

9.3 High

AI Score

Confidence

High

0.008 Low

EPSS

Percentile

81.2%