First published: Wed Apr 27 2022(Updated: )
A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/curl | <=7.64.0-4+deb10u2 | 7.64.0-4+deb10u7 7.74.0-1.3+deb11u9 7.74.0-1.3+deb11u10 7.88.1-10+deb12u3 7.88.1-10+deb12u4 8.4.0-2 |
debian/curl | <=7.74.0-1.3+deb11u1<=7.64.0-4+deb10u2<=7.82.0-2 | |
Curl | <7.83.0 | |
Fedora | =36 | |
Fedora | =37 | |
Debian | =10.0 | |
Debian | =11.0 | |
All of | ||
netapp hci bootstrap os | ||
netapp hci compute node | ||
IBM Data ONTAP | ||
netapp solidfire \& hci management node | ||
netapp solidfire \& hci storage node | ||
Brocade Fabric OS | ||
All of | ||
netapp h300s firmware | ||
netapp h300s | ||
All of | ||
NetApp H500S Firmware | ||
netapp h500s | ||
All of | ||
netapp h700s firmware | ||
netapp h700s | ||
All of | ||
netapp h410s firmware | ||
netapp h410s | ||
Splunk Universal Forwarder | >=8.2.0<8.2.12 | |
Splunk Universal Forwarder | >=9.0.0<9.0.6 | |
Splunk Universal Forwarder | =9.1.0 | |
netapp hci bootstrap os | ||
netapp hci compute node | ||
netapp h300s firmware | ||
netapp h300s | ||
NetApp H500S Firmware | ||
netapp h500s | ||
netapp h700s firmware | ||
netapp h700s | ||
netapp h410s firmware | ||
netapp h410s |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-27776 refers to an insufficiently protected credentials vulnerability in curl 7.83.0.
The severity of CVE-2022-27776 is high (6.5).
CVE-2022-27776 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.
The vulnerable software versions include curl 7.64.0-4+deb10u7, 7.74.0-1.3+deb11u9, 7.74.0-1.3+deb11u10, 7.88.1-10+deb12u3, 7.88.1-10+deb12u4, and 8.4.0-2.
You can find more information about CVE-2022-27776 at the following references: [link1], [link2], [link3].