First published: Tue Oct 25 2016(Updated: )
curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd24-curl | <0:7.61.1-1.el6 | 0:7.61.1-1.el6 |
redhat/httpd24-httpd | <0:2.4.34-7.el6 | 0:2.4.34-7.el6 |
redhat/httpd24-nghttp2 | <0:1.7.1-7.el6 | 0:1.7.1-7.el6 |
redhat/httpd24-curl | <0:7.61.1-1.el7 | 0:7.61.1-1.el7 |
redhat/httpd24-httpd | <0:2.4.34-7.el7 | 0:2.4.34-7.el7 |
redhat/httpd24-nghttp2 | <0:1.7.1-7.el7 | 0:1.7.1-7.el7 |
redhat/curl | <7.51.0 | 7.51.0 |
Curl | <7.51.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8624 is classified as a moderate severity vulnerability, as it may allow redirection to unintended hosts.
To fix CVE-2016-8624, update curl to version 7.51.0 or later, or apply the relevant patches provided by your operating system vendor.
CVE-2016-8624 affects all versions of curl prior to 7.51.0.
The risks include the possibility of man-in-the-middle attacks or misrouted requests due to incorrect parsing of URLs that end with a '#' character.
While no specific exploits have been publicly disclosed for CVE-2016-8624, the vulnerability allows an attacker to redirect users to unintended hosts.