Vulnerability Name: | CVE-2023-27535 (CCN-250530) | ||||||||||||
Assigned: | 2023-03-20 | ||||||||||||
Published: | 2023-03-20 | ||||||||||||
Updated: | 2023-06-29 | ||||||||||||
Summary: | cURL libcurl could allow a remote attacker to bypass security restrictions, caused by a FTP too eager connection reuse flaw. By sending a specially crafted request, an attacker could exploit this vulnerability to reuse a previously created FTP connection. | ||||||||||||
CVSS v3 Severity: | 5.9 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) 5.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
5.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.4 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:N/A:N)
| ||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2023-27535 Source: CCN Type: Progress Community Web site DataDirect Hybrid Data Pipeline libcurl Security Update June 2023 Source: CCN Type: Progress Community Web site DataDirect ODBC libcurl Security Update June 2023 Source: CCN Type: Project curl Security Advisory, March 20th 2023 CVE-2023-27535: FTP too eager connection reuse Source: XF Type: UNKNOWN curl-cve202327535-sec-bypass(250530) Source: support@hackerone.com Type: Exploit, Third Party Advisory support@hackerone.com Source: support@hackerone.com Type: Mailing List, Third Party Advisory support@hackerone.com Source: support@hackerone.com Type: Mailing List, Third Party Advisory support@hackerone.com Source: support@hackerone.com Type: Third Party Advisory support@hackerone.com Source: CCN Type: SNYK-UNMANAGED-CURL-3368137 Authentication Bypass Source: CCN Type: IBM Security Bulletin 6986573 (Safer Payments) Multiple publicly disclosed Libcurl vulnerabilities affect IBM Safer Payments Source: CCN Type: IBM Security Bulletin 6986579 (MQ) IBM MQ is affected by vulnerabilities in libcURL (CVE-2023-23916, CVE-2023-27535) Source: CCN Type: IBM Security Bulletin 6999605 (MQ Operator) IBM MQ Operator and Queue manager container images are vulnerable to multiple vulnerabilities from curl, go and apr-util Source: CCN Type: IBM Security Bulletin 7001689 (MaaS360) IBM MaaS360 Cloud Extender Agent, Mobile Enterprise Gateway, Configuration Utility, VPN, Certificate and Base Module affected by multiple vulnerabilities Source: CCN Type: IBM Security Bulletin 7002501 (QRadar WinCollect Agent) cURL as used by IBM QRadar WinCollect Agent contains multiple vulnerabilities Source: CCN Type: IBM Security Bulletin 7004263 (PowerSC) Multiple vulnerabilities in Curl affect PowerSC Source: CCN Type: IBM Security Bulletin 7008409 (AIX) Multiple vulnerabilities in cURL libcurl affect AIX Source: CCN Type: IBM Security Bulletin 7010743 (InfoSphere Information Server) IBM InfoSphere Information Server is affected by multiple vulnerabilities in Progress DataDirect Connect for ODBC Source: CCN Type: IBM Security Bulletin 7014659 (Cloud Transformation Advisor) IBM Cloud Transformation Advisor is vulnerable to multiple vulnerabilities | ||||||||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |