First published: Tue Aug 11 2020(Updated: )
A flaw was found in libcurl from versions 7.29.0 through 7.71.1. An application that performs multiple requests with libcurl's multi API, and sets the `CURLOPT_CONNECT_ONLY` option, might experience libcurl using the wrong connection. The highest threat from this vulnerability is to data confidentiality.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/curl | <0:7.61.1-18.el8 | 0:7.61.1-18.el8 |
debian/curl | 7.64.0-4+deb10u2 7.64.0-4+deb10u7 7.74.0-1.3+deb11u9 7.74.0-1.3+deb11u10 7.88.1-10+deb12u3 7.88.1-10+deb12u4 8.4.0-2 | |
debian/curl | <=7.64.0-4+deb10u1<=7.64.0-4<=7.68.0-1 | |
redhat/curl | <7.72.0 | 7.72.0 |
IBM Cloud Pak for Security (CP4S) | <=1.7.2.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.1.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.0.0 | |
haxx libcurl | >=7.29.0<=7.71.1 | |
siemens sinec infrastructure network services | <1.0.1.1 | |
Debian Debian Linux | =10.0 | |
oracle communications Cloud native core policy | =1.14.0 | |
Splunk Universal Forwarder | >=8.2.0<8.2.12 | |
Splunk Universal Forwarder | >=9.0.0<9.0.6 | |
Splunk Universal Forwarder | =9.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8231 is a vulnerability found in libcurl versions 7.29.0 through 7.71.1.
Applications that perform multiple requests using libcurl's multi API and set the CURLOPT_CONNECT_ONLY option might experience libcurl using the wrong connection.
The severity of CVE-2020-8231 is high, with a CVSS score of 7.5.
To fix CVE-2020-8231, upgrade to libcurl version 7.72.0 or higher.
You can find more information about CVE-2020-8231 at the following references: [link1], [link2], [link3].