curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.
The product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Link | Tags |
---|---|
https://hackerone.com/reports/887462 | third party advisory exploit |
https://curl.se/docs/CVE-2020-8177.html | vendor advisory |
https://www.debian.org/security/2021/dsa-4881 | third party advisory vendor advisory |
https://www.oracle.com/security-alerts/cpujan2022.html | third party advisory patch |
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | third party advisory patch |