vulnerability
CentOS Linux: CVE-2023-27534: Moderate: curl security update (CESA-2023:6679)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:L/Au:S/C:C/I:C/A:C) | Mar 30, 2023 | Nov 8, 2023 | Jan 28, 2025 |
Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
Mar 30, 2023
Added
Nov 8, 2023
Modified
Jan 28, 2025
Description
A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.
Solutions
centos-upgrade-curlcentos-upgrade-curl-debuginfocentos-upgrade-curl-debugsourcecentos-upgrade-curl-minimalcentos-upgrade-curl-minimal-debuginfocentos-upgrade-libcurlcentos-upgrade-libcurl-debuginfocentos-upgrade-libcurl-develcentos-upgrade-libcurl-minimalcentos-upgrade-libcurl-minimal-debuginfo
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.