Vulnerability Name: | CVE-2010-3842 (CCN-62556) | ||||||||
Assigned: | 2010-10-13 | ||||||||
Published: | 2010-10-13 | ||||||||
Updated: | 2010-10-28 | ||||||||
Summary: | Absolute path traversal vulnerability in curl 7.20.0 through 7.21.1, when the --remote-header-name or -J option is used, allows remote servers to create or overwrite arbitrary files by using \ (backslash) as a separator of path components within the Content-disposition HTTP header. | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P) 4.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P/E:U/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-22 | ||||||||
Vulnerability Consequences: | File Manipulation | ||||||||
References: | Source: CCN Type: cURL Web page cURL Source: CCN Type: Project cURL Security Advisory, October 13th 2010 curl local file overwrite Source: CONFIRM Type: Vendor Advisory http://curl.haxx.se/docs/adv_20101013.html Source: MITRE Type: CNA CVE-2010-3842 Source: CCN Type: SA39532 cURL Content-Disposition Header Filename Parsing Vulnerability Source: SECUNIA Type: Vendor Advisory 39532 Source: CCN Type: SECTRACK ID: 1024583 cURL 'Content-disposition' Header Processing Flaw Lets Remote Users Overwrite Files and Potentially Source: SECTRACK Type: UNKNOWN 1024583 Source: MLIST Type: UNKNOWN [oss-security] 20101013 CVE Request -- cURL / mingw32-cURL -- Did not strip directory parts separated by backslashes, when downloading files Source: MLIST Type: Patch [oss-security] 20101013 Re: CVE Request -- cURL / mingw32-cURL -- Did not strip directory parts separated by backslashes, when downloading files Source: MLIST Type: UNKNOWN [oss-security] 20101013 Re: CVE Request -- cURL / mingw32-cURL -- Did not strip directory parts separated by backslashes, when downloading files Source: CCN Type: OSVDB ID: 68698 cURL src/main.c parse_filename() Function Content-Disposition HTTP Header Filename Handling Arbitrary File Overwrite Source: CCN Type: BID-44086 curl 'Content-Disposition' HTTP Header Arbitrary File Overwrite Vulnerability Source: CONFIRM Type: UNKNOWN https://bugzilla.redhat.com/show_bug.cgi?id=642642 Source: XF Type: UNKNOWN curl-parsefilename-file-overwrite(62556) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |