First published: Wed May 26 2021(Updated: )
cURL libcurl could allow a remote attacker to obtain sensitive information, caused by a flaw in the option parser for sending NEW_ENV variables. By sending a specially-crafted request using a clear-text network protocol, an attacker could exploit this vulnerability to obtain sensitive internal information to the server, and use this information to launch further attacks against the affected system.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/curl | <0:7.61.1-22.el8 | 0:7.61.1-22.el8 |
debian/curl | <=7.64.0-4+deb10u2 | 7.64.0-4+deb10u7 7.74.0-1.3+deb11u9 7.74.0-1.3+deb11u10 7.88.1-10+deb12u3 7.88.1-10+deb12u4 8.4.0-2 |
debian/curl | <=7.74.0-1.2<=7.64.0-4<=7.64.0-4+deb10u2<=7.64.0-4+deb10u1 | |
redhat/curl | <7.77.0 | 7.77.0 |
IBM QRadar SIEM | <=7.5.0 GA | |
IBM QRadar SIEM | <=7.4.3 GA - 7.4.3 FP4 | |
IBM QRadar SIEM | <=7.3.3 GA - 7.3.3 FP10 | |
haxx curl | >=7.7<=7.76.1 | |
Debian GNU/Linux | =9.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
oracle communications Cloud native core binding support function | =1.11.0 | |
oracle communications cloud native core network function cloud native environment | =1.10.0 | |
Oracle Communications Cloud Native Core Network Repository Function | =1.15.0 | |
Oracle Communications Cloud Native Core Network Repository Function | =1.15.1 | |
Oracle Communications Cloud Native Core Network Slice Selection Function | =1.8.0 | |
Oracle Communications Cloud Native Core Service Communication Proxy | =1.15.0 | |
Oracle Hyperion Essbase | <11.1.2.4.047 | |
Oracle Hyperion Essbase | >=21.0<21.3 | |
MySQL Server | <5.7.34 | |
MySQL Server | >=8.0.15<8.0.25 | |
siemens sinec infrastructure network services | <1.0.1.1 | |
Splunk Universal Forwarder | >=8.2.0<8.2.12 | |
Splunk Universal Forwarder | >=9.0.0<9.0.6 | |
Splunk Universal Forwarder | =9.1.0 |
This issue can be avoided by not setting any telnet options for the curl command line tool (using the -t / --telnet-option command line option) or the libcurl library (using the CURLOPT_TELNETOPTIONS option) when telnet protocol is not meant to be used. If telnet protocol needs to be used with curl / libcurl, along with the NEW_ENV telnet option, ensure that no environment variable set via the NEW_ENV option has the name or value longer than 127 bytes.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22898 is a vulnerability in the curl library that allows for information disclosure when using the `-t` command line option.
CVE-2021-22898 has a severity rating of 7.5 (high).
CVE-2021-22898 affects curl versions 7.7 through 7.76.1.
To fix CVE-2021-22898, update curl to version 7.88.1-11 or higher.
Yes, you can find additional information about CVE-2021-22898 in the references provided.