A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.
References
Link | Resource |
---|---|
https://hackerone.com/reports/1892351 | Exploit Third Party Advisory |
https://hackerone.com/reports/1892351 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2024/03/msg00016.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2024/03/msg00016.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/ | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202310-12 | Third Party Advisory |
https://security.gentoo.org/glsa/202310-12 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20230420-0012/ | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20230420-0012/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
|
History
23 Apr 2025, 17:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://security.netapp.com/advisory/ntap-20230420-0012/ - Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202310-12 - Third Party Advisory | |
References | () https://hackerone.com/reports/1892351 - Exploit, Third Party Advisory |
27 Mar 2024, 14:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.debian.org/debian-lts-announce/2024/03/msg00016.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/ - Mailing List, Third Party Advisory | |
First Time |
Splunk
Splunk universal Forwarder |
|
CPE | cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:* cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:* |
17 Mar 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Nov 2023, 04:09
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
20 Oct 2023, 18:45
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* |
|
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20230420-0012/ - Third Party Advisory | |
References | (GENTOO) https://security.gentoo.org/glsa/202310-12 - Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/ - Mailing List | |
First Time |
Netapp active Iq Unified Manager
Fedoraproject fedora Netapp h410s Broadcom brocade Fabric Operating System Firmware Netapp h700s Netapp h500s Firmware Netapp Netapp h300s Firmware Fedoraproject Netapp h500s Netapp h410s Firmware Netapp h700s Firmware Netapp h300s Broadcom |
11 Oct 2023, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Apr 2023, 09:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Apr 2023, 04:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Apr 2023, 16:23
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-22 | |
References | (MISC) https://hackerone.com/reports/1892351 - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CPE | cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:* | |
First Time |
Haxx
Haxx curl |
Information
Published : 2023-03-30 20:15
Updated : 2025-04-23 17:16
NVD link : CVE-2023-27534
Mitre link : CVE-2023-27534
JSON object : View
Products Affected
netapp
- h410s
- h500s
- h300s
- h700s_firmware
- h500s_firmware
- h410s_firmware
- h700s
- active_iq_unified_manager
- h300s_firmware
fedoraproject
- fedora
splunk
- universal_forwarder
haxx
- curl
broadcom
- brocade_fabric_operating_system_firmware
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')