{"uuid": "2e666f11-5e09-480f-8968-fdcd10c233ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46218", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19947", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-46218\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: This flaw allows a malicious HTTP server to set \"super cookies\" in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl's function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.\n\ud83d\udccf Published: 2023-12-07T01:10:34.846Z\n\ud83d\udccf Modified: 2025-06-30T16:20:37.028Z\n\ud83d\udd17 References:\n1. https://hackerone.com/reports/2212193\n2. https://curl.se/docs/CVE-2023-46218.html\n3. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ZX3VW67N4ACRAPMV2QS2LVYGD7H2MVE/\n4. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD/\n5. https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html\n6. https://www.debian.org/security/2023/dsa-5587\n7. https://security.netapp.com/advisory/ntap-20240125-0007/", "creation_timestamp": "2025-06-30T17:07:33.000000Z"}