Skip to content
GitLab
Projects Groups Topics Snippets
  • /
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Register
  • Sign in
  • aports aports
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Graph
    • Compare revisions
  • Issues 669
    • Issues 669
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 287
    • Merge requests 287
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Releases
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar

Our ARM infrastructure is unreachable at the moment, so CI jobs will time-out and packages will not be updated until the servers are back.

  • alpinealpine
  • aportsaports
  • Issues
  • #1813
Closed
Open
Issue created Apr 24, 2013 by Leonardo Arena@larenaDeveloper

[v2.3] Vulnerability in curl < 7.30.0 allows session hijack

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944
http://curl.haxx.se/docs/adv\_20130412.html

  1. VULNERABILITY

libcurl is vulnerable to a cookie leak vulnerability when doing requests
across domains with matching tails.

When communicating over HTTP (S) and having libcurl’s cookie engine enabled,
libcurl will store and hold cookies for use when subsequent requests are
done to hosts and paths that match those kept cookies. Due to a bug in the
tailmatching function, libcurl could wrongly send cookies meant for the
domain ‘ample.com’ when communicating with ‘example.com’.

This vulnerability can be used to hijack sessions in targetted attacks since
registering domains using a known domain’s name as an ending is trivial.

Both curl the command line tool and applications using the libcurl library
are vulnerable.

There are no known exploits available at this time.

The Common Vulnerabilities and Exposures (CVE) project has assigned the name
CVE-2013-1944 to this issue.

  1. AFFECTED VERSIONS

Affected versions: all versions to and including 7.29.0
Not affected versions: curl >= 7.30.0

libcurl is used by many applications, but not always advertised as such!

  1. THE SOLUTION

libcurl 7.30.0 implements the function properly and will not send cookies to
sites just because the host names use the same tail.

  1. RECOMMENDATIONS

We suggest you take one of the following actions immediately, in order of
preference:

A - Upgrade to curl and libcurl 7.30.0

B - Apply this patch and rebuild libcurl

http://curl.haxx.se/curl-tailmatch.patch

C - Disable use of cookies or HTTP entirely in your application

  1. TIME LINE

Vulnerability found and patched by YAMADA Yasuharu.

It was reported (publicly) to the curl project on April 9th 2013.

curl 7.30.0 was released on April 12th 2013, coordinated with the
publication of this advisory.

  1. CREDITS

Reported and fixed by YAMADA Yasuharu. Thanks a lot!

(from redmine: issue id 1813, created on 2013-04-24, closed on 2013-04-24)

  • Relations:
    • duplicates #1780 (closed)
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Time tracking