First published: Tue Feb 07 2023(Updated: )
A cleartext transmission of sensitive information vulnerability exists in curl <v7.88.0 that could cause HSTS functionality to behave incorrectly when multiple URLs are requested in parallel. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. This HSTS mechanism would however surprisingly fail when multiple transfers are done in parallel as the HSTS cache file gets overwritten by the most recentlycompleted transfer. A later HTTP-only transfer to the earlier host name would then *not* get upgraded properly to HSTS.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/curl | <7.88.0 | 7.88.0 |
IBM IBM® Engineering Requirements Management DOORS | <=9.7.2.7 | |
IBM IBM® Engineering Requirements Management DOORS Web Access | <=9.7.2.7 | |
Haxx Curl | >=7.77.0<7.88.0 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
NetApp Clustered Data ONTAP | =9.0 | |
All of | ||
Netapp H300s Firmware | ||
Netapp H300s | ||
All of | ||
Netapp H500s Firmware | ||
Netapp H500s | ||
All of | ||
Netapp H700s Firmware | ||
Netapp H700s | ||
All of | ||
Netapp H410s Firmware | ||
Netapp H410s | ||
Splunk Universal Forwarder | >=8.2.0<8.2.12 | |
Splunk Universal Forwarder | >=9.0.0<9.0.6 | |
Splunk Universal Forwarder | =9.1.0 | |
Netapp H300s Firmware | ||
Netapp H300s | ||
Netapp H500s Firmware | ||
Netapp H500s | ||
Netapp H700s Firmware | ||
Netapp H700s | ||
Netapp H410s Firmware | ||
Netapp H410s |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23915 is a vulnerability in curl <v7.88.0 that allows cleartext transmission of sensitive information, causing HSTS functionality to behave incorrectly when multiple URLs are requested in parallel.
If you are using curl <v7.88.0 and requesting multiple URLs in parallel, this vulnerability could expose sensitive information transmitted over clear-text HTTP.
The severity of CVE-2023-23915 is medium, with a CVSS score of 6.5.
To fix the CVE-2023-23915 vulnerability, you need to update curl to version 7.88.0 or later.
You can find more information about CVE-2023-23915 at the following references: [Link 1](https://curl.se/docs/CVE-2023-23915.html), [Link 2](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2170750), [Link 3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2170749).