A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.
References
| Link | Resource |
|---|---|
| https://hackerone.com/reports/1892351 | Exploit Third Party Advisory |
| https://hackerone.com/reports/1892351 | Exploit Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2024/03/msg00016.html | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2024/03/msg00016.html | Mailing List Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/ | Mailing List Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/ | Mailing List Third Party Advisory |
| https://security.gentoo.org/glsa/202310-12 | Third Party Advisory |
| https://security.gentoo.org/glsa/202310-12 | Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20230420-0012/ | Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20230420-0012/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
Configuration 6 (hide)
| AND |
|
Configuration 7 (hide)
| AND |
|
Configuration 8 (hide)
|
History
23 Apr 2025, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://security.netapp.com/advisory/ntap-20230420-0012/ - Third Party Advisory | |
| References | () https://security.gentoo.org/glsa/202310-12 - Third Party Advisory | |
| References | () https://hackerone.com/reports/1892351 - Exploit, Third Party Advisory |
27 Mar 2024, 14:54
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Splunk
Splunk universal Forwarder |
|
| CPE | cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:* cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:* |
|
| References | () https://lists.debian.org/debian-lts-announce/2024/03/msg00016.html - Mailing List, Third Party Advisory | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/ - Mailing List, Third Party Advisory |
17 Mar 2024, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
07 Nov 2023, 04:09
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
20 Oct 2023, 18:45
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* |
|
| First Time |
Netapp active Iq Unified Manager
Fedoraproject fedora Netapp h410s Broadcom brocade Fabric Operating System Firmware Netapp h700s Netapp h500s Firmware Netapp Netapp h300s Firmware Fedoraproject Netapp h500s Netapp h410s Firmware Netapp h700s Firmware Netapp h300s Broadcom |
|
| References | (CONFIRM) https://security.netapp.com/advisory/ntap-20230420-0012/ - Third Party Advisory | |
| References | (GENTOO) https://security.gentoo.org/glsa/202310-12 - Third Party Advisory | |
| References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/ - Mailing List |
11 Oct 2023, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
20 Apr 2023, 09:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
09 Apr 2023, 04:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
07 Apr 2023, 16:23
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-22 | |
| CPE | cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| References | (MISC) https://hackerone.com/reports/1892351 - Exploit, Third Party Advisory | |
| First Time |
Haxx
Haxx curl |
Information
Published : 2023-03-30 20:15
Updated : 2025-04-23 17:16
NVD link : CVE-2023-27534
Mitre link : CVE-2023-27534
JSON object : View
Products Affected
netapp
- h410s
- h500s
- h300s
- h700s_firmware
- h500s_firmware
- h410s_firmware
- h700s
- active_iq_unified_manager
- h300s_firmware
fedoraproject
- fedora
splunk
- universal_forwarder
haxx
- curl
broadcom
- brocade_fabric_operating_system_firmware
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
