CVE-2021-22898

Published Jun 11, 2021

Last updated 15 days ago

Overview

Description
curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.
Source
support@hackerone.com
NVD status
Modified
Products
curl, debian_linux, fedora, communications_cloud_native_core_binding_support_function, communications_cloud_native_core_network_function_cloud_native_environment, communications_cloud_native_core_network_repository_function, communications_cloud_native_core_network_slice_selection_function, communications_cloud_native_core_service_communication_proxy, essbase, mysql_server, sinec_infrastructure_network_services, universal_forwarder

Risk scores

CVSS 3.1

Type
Primary
Base score
3.1
Impact score
1.4
Exploitability score
1.6
Vector string
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
Severity
LOW

CVSS 2.0

Type
Primary
Base score
2.6
Impact score
2.9
Exploitability score
4.9
Vector string
AV:N/AC:H/Au:N/C:P/I:N/A:N

Weaknesses

support@hackerone.com
CWE-200
nvd@nist.gov
CWE-909

Social media

Hype score
Not currently trending

Configurations

References

Sources include official advisories and independent security research.