First published: Tue Oct 03 2023(Updated: )
cURL libcurl could allow a remote attacker to bypass security restrictions, caused by a flaw in the curl_easy_duphandle function if a transfer has cookies enabled when the handle is duplicated. By sending a specially crafted request, an attacker could exploit this vulnerability to insert cookies at will into a running program.
Credit: support@hackerone.com CVE-2023-38545 CVE-2023-38039 CVE-2023-38546 CVE-2023-42915 support@hackerone.com support@hackerone.com CVE-2023-38545 CVE-2023-38039 CVE-2023-38546 CVE-2023-38545 CVE-2023-38039 CVE-2023-38546 CVE-2023-38545 CVE-2023-38039 CVE-2023-38546
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS | <16.7.5 | 16.7.5 |
Apple iPadOS | <16.7.5 | 16.7.5 |
Apple macOS Ventura | <13.6.4 | 13.6.4 |
Apple macOS Monterey | <12.7.3 | 12.7.3 |
redhat/curl | <8.4.0 | 8.4.0 |
ubuntu/curl | <7.58.0-2ubuntu3.24+ | 7.58.0-2ubuntu3.24+ |
ubuntu/curl | <7.68.0-1ubuntu2.20 | 7.68.0-1ubuntu2.20 |
ubuntu/curl | <7.81.0-1ubuntu1.14 | 7.81.0-1ubuntu1.14 |
ubuntu/curl | <7.88.1-8ubuntu2.3 | 7.88.1-8ubuntu2.3 |
ubuntu/curl | <8.2.1-1ubuntu3.1 | 8.2.1-1ubuntu3.1 |
ubuntu/curl | <8.2.1-1ubuntu3.1 | 8.2.1-1ubuntu3.1 |
ubuntu/curl | <7.35.0-1ubuntu2.20+ | 7.35.0-1ubuntu2.20+ |
ubuntu/curl | <7.47.0-1ubuntu2.19+ | 7.47.0-1ubuntu2.19+ |
Haxx Libcurl | >=7.9.1<8.4.0 | |
Apple macOS Sonoma | <14.2 | 14.2 |
debian/curl | 7.74.0-1.3+deb11u12 7.74.0-1.3+deb11u11 7.88.1-10+deb12u6 7.88.1-10+deb12u5 8.8.0-4 8.9.1-1 | |
IBM QRadar Network Packet Capture | <=7.5.0 - 7.5.0 Update Package 7 | |
Fortinet FortiExtender | >=7.4.0<=7.4.1 | |
Fortinet FortiExtender | >=7.2.0<=7.2.3 | |
Fortinet FortiOS (only FGT_VM64) | >=7.4.0<=7.4.1 | |
Fortinet FortiOS (only FGT_VM64) | >=7.2.0<=7.2.6 | |
Fortinet FortiOS (only FGT_VM64) | >=7.0.1<=7.0.13 | |
Fortinet FortiProxy (only FortiProxy_VM64) | >=7.4.0<=7.4.1 | |
Fortinet FortiProxy (only FortiProxy_VM64) | >=7.2.0<=7.2.7 | |
Fortinet FortiProxy (only FortiProxy_VM64) | >=7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2023-38546 is a vulnerability in curl that allows cookie injection with none file.
CVE-2023-38546 affects Ubuntu versions 7.68.0-1ubuntu2.20, 7.81.0-1ubuntu1.14, and 7.88.1-8ubuntu2.3.
CVE-2023-38546 affects Debian versions 7.64.0-4+deb10u7, 7.74.0-1.3+deb11u10, 7.88.1-10+deb12u4, and 8.3.0-3.
You can find more information about CVE-2023-38546 on the MITRE CVE website, the curl documentation, and the Ubuntu security notices page.
To fix CVE-2023-38546, update curl to the recommended versions provided by the respective Linux distributions.