A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Link | Tags |
---|---|
https://hackerone.com/reports/1547048 | third party advisory exploit |
https://security.netapp.com/advisory/ntap-20220609-0008/ | third party advisory |
https://www.debian.org/security/2022/dsa-5197 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html | third party advisory mailing list |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/ | vendor advisory mailing list third party advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/ | vendor advisory mailing list third party advisory |
https://security.gentoo.org/glsa/202212-01 | third party advisory vendor advisory |