First published: Sat Jul 18 2020(Updated: )
curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/curl | 7.64.0-4+deb10u2 7.64.0-4+deb10u7 7.74.0-1.3+deb11u9 7.74.0-1.3+deb11u10 7.88.1-10+deb12u3 7.88.1-10+deb12u4 8.4.0-2 | |
debian/curl | <=7.68.0-1<=7.52.1-1<=7.52.1-5+deb9u10<=7.64.0-4+deb10u1<=7.64.0-1 | |
Haxx Curl | >=7.20.0<=7.70.0 | |
Debian Debian Linux | =10.0 | |
Fujitsu M10-1 Firmware | <xcp2410 | |
Fujitsu M10-1 | ||
Fujitsu M10-4 Firmware | <xcp2410 | |
Fujitsu M10-4 | ||
Fujitsu M10-4s Firmware | <xcp2410 | |
Fujitsu M10-4s | ||
Fujitsu M12-1 Firmware | <xcp2410 | |
Fujitsu M12-1 | ||
Fujitsu M12-2 Firmware | <xcp2410 | |
Fujitsu M12-2 | ||
Fujitsu M12-2s Firmware | <xcp2410 | |
Fujitsu M12-2s | ||
Fujitsu M10-1 Firmware | <xcp3110 | |
Fujitsu M10-4 Firmware | <xcp3110 | |
Fujitsu M10-4s Firmware | <xcp3110 | |
Fujitsu M12-1 Firmware | <xcp3110 | |
Fujitsu M12-2 Firmware | <xcp3110 | |
Fujitsu M12-2s Firmware | <xcp3110 | |
Siemens Sinec Infrastructure Network Services | <1.0.1.1 | |
All of | ||
Fujitsu M10-1 Firmware | <xcp2410 | |
Fujitsu M10-1 | ||
All of | ||
Fujitsu M10-4 Firmware | <xcp2410 | |
Fujitsu M10-4 | ||
All of | ||
Fujitsu M10-4s Firmware | <xcp2410 | |
Fujitsu M10-4s | ||
All of | ||
Fujitsu M12-1 Firmware | <xcp2410 | |
Fujitsu M12-1 | ||
All of | ||
Fujitsu M12-2 Firmware | <xcp2410 | |
Fujitsu M12-2 | ||
All of | ||
Fujitsu M12-2s Firmware | <xcp2410 | |
Fujitsu M12-2s | ||
All of | ||
Fujitsu M10-1 Firmware | <xcp3110 | |
Fujitsu M10-1 | ||
All of | ||
Fujitsu M10-4 Firmware | <xcp3110 | |
Fujitsu M10-4 | ||
All of | ||
Fujitsu M10-4s Firmware | <xcp3110 | |
Fujitsu M10-4s | ||
All of | ||
Fujitsu M12-1 Firmware | <xcp3110 | |
Fujitsu M12-1 | ||
All of | ||
Fujitsu M12-2 Firmware | <xcp3110 | |
Fujitsu M12-2 | ||
All of | ||
Fujitsu M12-2s Firmware | <xcp3110 | |
Fujitsu M12-2s | ||
Splunk Universal Forwarder | >=8.2.0<8.2.12 | |
Splunk Universal Forwarder | >=9.0.0<9.0.6 | |
Splunk Universal Forwarder | =9.1.0 | |
<=1.7.2.0 | ||
<=1.7.1.0 | ||
<=1.7.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8177 is a vulnerability in cURL that allows a remote attacker to overwrite arbitrary files on the system.
CVE-2020-8177 works by improperly handling certain parameters when using -J (--remote-header-name) and -I (--include) in the same command line, which can be exploited to overwrite a local file.
CVE-2020-8177 has a severity rating of 7.8 (High).
Versions 7.20.0 through 7.70.0 of cURL are affected by CVE-2020-8177.
To fix CVE-2020-8177, you should update cURL to version 7.74.0-1.3+deb11u10 or later.