First published: Tue Nov 18 2014(Updated: )
cURL and libcurl before 7.38.0 allow remote attackers to bypass the Same Origin Policy and set cookies for arbitrary sites by setting a cookie for a top-level domain.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
haxx curl | <=7.37.1 | |
haxx curl | =7.31.0 | |
haxx curl | =7.32.0 | |
haxx curl | =7.33.0 | |
haxx curl | =7.34.0 | |
haxx curl | =7.35.0 | |
haxx curl | =7.36.0 | |
haxx curl | =7.37.0 | |
haxx libcurl | <=7.37.1 | |
haxx libcurl | =7.31.0 | |
haxx libcurl | =7.32.0 | |
haxx libcurl | =7.33.0 | |
haxx libcurl | =7.34.0 | |
haxx libcurl | =7.35.0 | |
haxx libcurl | =7.36.0 | |
haxx libcurl | =7.37.0 | |
macOS Yosemite | <=10.10.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3620 is categorized as a medium severity vulnerability due to the potential for cookie theft and data manipulation.
To fix CVE-2014-3620, upgrade cURL or libcurl to version 7.38.0 or later.
CVE-2014-3620 affects cURL and libcurl versions from 7.31.0 to 7.37.1.
The main risks of CVE-2014-3620 include unauthorized access to cookies and possible session hijacking.
Yes, CVE-2014-3620 can be exploited by remote attackers to bypass the Same Origin Policy.