First published: Tue Jul 02 2019(Updated: )
A non-privileged user or program can put code and a config file in a known non-privileged path (under C:/usr/local/) that will make curl <= 7.65.1 automatically run the code (as an openssl "engine") on invocation. If that curl is invoked by a privileged user it can do anything it wants.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Curl | <=7.65.1 | |
Microsoft Windows | ||
Oracle Enterprise Manager Ops Center | =12.3.3 | |
Oracle Enterprise Manager Ops Center | =12.4.0 | |
Oracle HTTP Server | =12.2.1.3.0 | |
Oracle HTTP Server | =12.2.1.4.0 | |
MySQL | >=5.0.0<=5.7.27 | |
MySQL | >=8.0.0<=8.0.17 | |
Oracle OSS Support Tools | =20.0 | |
NetApp OnCommand Insight | ||
NetApp OnCommand Unified Manager for Windows | >=7.3 | |
NetApp OnCommand Unified Manager for vSphere | >=9.5 | |
NetApp OnCommand Workflow Automation | ||
NetApp SnapCenter |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5443 is a vulnerability in the Curl software that allows a non-privileged user or program to execute code on invocation.
CVE-2019-5443 has a severity rating of 7.8 (high).
Curl version 7.65.1 and earlier versions are affected by CVE-2019-5443.
Upgrade to a version of Curl that is not affected by the vulnerability, such as version 7.65.2 or later.
You can find more information about CVE-2019-5443 on the official Curl website or security advisories.