Select your cookie preferences

We use cookies and similar tools to enhance your experience, provide our services, deliver relevant advertising, and make improvements. Approved third parties also use these tools to help us deliver advertising and provide certain site features.

CVE-2023-27533

Public on 2023-03-23
Modified on 2024-02-01
Description

The curl advisory describes this issue as follows:

curl supports communicating using the TELNET protocol and as a part of this it offers users to pass on user name and "telnet options" for the server negotiation.

Due to lack of proper input scrubbing and without it being the documented functionality, curl would pass on user name and telnet options to the server as provided. This could allow users to pass in carefully crafted content that pass on content or do option negotiation without the application intending to do so. In particular if an application for example allows users to provide the data or parts of the data.

Severity
Medium
See what this means
CVSS v3 Base Score
4.5
See breakdown
Continue reading

Affected Packages

Platform Package Release Date Advisory
Amazon Linux 1 curl 2023-04-13 19:01 ALAS-2023-1727
Amazon Linux 2 - Core curl 2023-06-05 16:39 ALAS2-2023-2070
Amazon Linux 2023 curl 2023-06-05 16:38 ALAS2023-2023-193

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
NVD CVSSv3 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H