Joined: 12 May 2004
|Posted: Tue Mar 10, 2009 12:26 am Post subject: [ GLSA 200903-21 ] cURL: Arbitrary file access
|Gentoo Linux Security Advisory
Title: cURL: Arbitrary file access (GLSA 200903-21)
Date: March 09, 2009
A vulnerability in cURL may allow for arbitrary file access.
cURL is a command line tool for transferring files with URL syntax, supporting numerous protocols.
Vulnerable: < 7.19.4
Unaffected: >= 7.19.4
Architectures: All supported architectures
David Kierznowski reported that the redirect implementation accepts arbitrary Location values when CURLOPT_FOLLOWLOCATION is enabled.
A remote attacker could possibly exploit this vulnerability to make remote HTTP servers trigger arbitrary requests to intranet servers and read or overwrite arbitrary files via a redirect to a file: URL, or, if the libssh2 USE flag is enabled, execute arbitrary commands via a redirect to an scp: URL.
There is no known workaround at this time.
All cURL users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/curl-7.19.4"