fkie_cve-2013-1944
Vulnerability from fkie_nvd
Published
2013-04-29 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "47BC981B-0088-4697-BC2F-E5DBA2BBA892",
"versionEndIncluding": "7.29.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D85742EE-A981-45EA-9D14-2BA5E4CF81FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3FF7D563-A268-478E-9965-B574768DA3E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:6.1:beta:*:*:*:*:*:*",
"matchCriteriaId": "7DE97346-DCBA-4FF3-AD5E-7083066B578A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9A8C121F-B533-4257-AC37-2253AAD3099E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3D19ACAA-BCEA-4450-8656-491E5CAE941D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:6.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CBC5B73D-4741-4BEE-ACC7-0DEE13E3583C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "17106212-58A2-4479-AEEB-4FEAE2DFFA61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B41E3C37-5586-430F-BB13-5FF63A512D5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:6.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "177412FA-CAA2-4A04-B9E9-BC3891C4B8E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:6.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8692193D-6A8D-4F54-ACEF-8B784A06C7B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "27FD145B-DA28-4F2E-90AA-BDB1ECD8A10B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F1DE174C-D09D-4A5F-A774-452385556B22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5EF07A93-5733-4875-837B-BF30EA8CC538",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "46983CB7-F22C-4BA9-B7FD-B9A642C39D84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A88A5589-2E8F-48F1-912E-3F2994547953",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "333403F5-6E8E-464D-962B-9C9EB4BFBDC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BC7E5201-24A0-4CEF-84D2-76DB195D3A8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B256735A-93DF-41EF-A395-4AE96D84B1BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9E2EA5EB-B2B6-47EE-8E65-18900FF3FACD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "650D88F7-EFCA-41E3-909B-9982F5F137B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "BAE65C9C-1DE3-42B2-8A33-8A313025A23D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E1A4BB56-CD4F-44BD-99D7-A1ADE44359E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "54C84348-C995-497A-970B-A476163CCCD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CE53270B-8725-46C8-BECA-18D22586E6BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C08511C8-C3A6-46AD-BB51-89D11C1D5EF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "51CCDA6F-57F9-4210-BEBB-6FDAAF8CDFEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.8:*:*:*:*:*:*:*",
"matchCriteriaId": "EE4D74D0-C499-40DB-B6EB-4F235D8ABEEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D00036A8-88E0-433A-BC21-E88712B829D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.9:*:*:*:*:*:*:*",
"matchCriteriaId": "CAAE7B6C-903A-49B5-8CF2-F487C997F113",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "63B81C3D-2886-4E2B-9F85-DD074B3155B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E610D9BA-4FDA-4E6D-96DC-168209C053FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "44BF0AF1-DFE0-4E37-B589-CFCE97B55876",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FE536964-4741-459B-BBC8-61A7BAA8B71C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "815B9BC6-7DE1-4149-AB7C-362188EE2871",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "A7D07368-C6FE-4229-8262-46A974773F13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "74980771-8060-4F5E-A6BD-D67956D9AB89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "FE15C002-03E3-4503-A9EB-4C7CF190FFEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "833263C9-E6A1-41F5-9164-7A4F3AACEB8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1EA91B1A-835E-43AD-B9C2-992691B3A56E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3F7D61B0-F591-47AE-918B-41BA0A2C21E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8DFF10A5-6779-46B3-B9BE-693654817334",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.10.4:*:*:*:*:*:*:*",
"matchCriteriaId": "53638104-536B-482B-8853-1CE3967FB6F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FA92CDC6-7EB4-492A-91EE-B5F70F7D6C7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5D65CDC0-580B-42B3-97E8-69BE44CDB68C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*",
"matchCriteriaId": "01001EEA-AB99-4041-8188-38CEBE9C3031",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*",
"matchCriteriaId": "31DB0DA3-88B7-43ED-8102-CEBC28524CE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "87596B6A-A7B3-4256-9982-45D3B6E3E018",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0045855F-A707-415A-AC12-6981B68B08E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B49807DC-0BDA-41F6-BB76-7C62328D245F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0A78B6B8-9F4B-46AC-BB04-7EBADC690CBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EFE80B46-33F0-4338-AF37-9E7E31FC5E83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DD38D8C6-9EEE-4160-9353-773943A560B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD33549E-EFFB-466F-8B47-BE036D454693",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16BB71C8-3564-4E69-A2C3-E9AB1F9EF20C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4966AA12-15DB-44E5-84AF-9D7AF4A52F86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*",
"matchCriteriaId": "827B6C8A-59C4-4714-9406-5C8EB5073AB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93A11305-E4FF-473B-9415-AF1F0E7A27D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8444095B-AF8F-42B5-BD4D-9CBE9238E42D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C22F23AE-02AB-42F0-AA16-D2F8C94E5DE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B33DE520-BD2A-4499-B1F8-1439AE16AB57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*",
"matchCriteriaId": "041FCB20-E74F-4550-AC48-EE4E5875E118",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D16DBA5E-582F-4648-932E-8A1EFB7FE3D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A25323F4-7C67-4097-AD53-A6B9E6D96BA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*",
"matchCriteriaId": "36919682-F59E-4EC0-886C-AE967F636753",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B45AF234-3651-4367-BFEF-8766F66FB138",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E46A9126-A02E-44CD-885D-0956E0C87C2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*",
"matchCriteriaId": "91E9C756-7FE3-4197-8C18-99CD1F49B0D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*",
"matchCriteriaId": "88806B7D-5EFE-4F91-B115-732882D2C126",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5BB9E8AB-B3EC-4743-B39B-7325EEB17233",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5030FBB0-C95B-4ADE-BFC2-CCA37AAD019B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5513618A-6770-4292-95D1-68F55D8343CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7494C01F-E9EC-406E-879A-B2045865E282",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7DD9F894-4576-4ED1-9F55-4C27ECE7E058",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*",
"matchCriteriaId": "49AFACAC-BBAF-469B-BF05-0478E987120F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6A136E86-0697-4915-BC49-F570C776EDE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ECB241AF-A01D-4FD6-B98A-F4C20F844C2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B61901-F7DF-4805-8EB7-CA1701CA81CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EB0CDEC9-224A-4668-B2E4-2145653E3F2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E92BE9CB-F001-47A0-94E0-48FC01A63FE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*",
"matchCriteriaId": "324E2A20-2F66-4E03-9A7F-A09E631E9033",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C8987B53-BD80-40B9-8429-21AD97208040",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*",
"matchCriteriaId": "490D1BDC-33B9-43BA-B6DA-42DEE577082A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B465BE7E-0B4D-4BC4-894B-3F51A201CE91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CAA17087-3021-4961-B53C-CDCC872A31A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5CA3936-4602-40E6-B75C-58D3F24268E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D87C110C-21DD-438A-90EF-BE516CF59F3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AD2D9E0E-2EED-4FB5-859C-05226FC48D7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7CA01E21-71CE-4B07-B5A6-D0D7AC493A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*",
"matchCriteriaId": "51239254-31CE-4BF7-8669-1525BA391362",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2E2BE20D-232D-4C86-81B0-C82CCC1CAA62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D652FD7C-1521-4391-AAE1-0A4D6F4CE8F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DB861143-F809-45CF-95BE-E64F4BA1A0DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E3480F4A-0AE0-4428-9EDA-5A6B994909A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*",
"matchCriteriaId": "936BF59E-33A8-46BA-9FBD-8763812E2F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*",
"matchCriteriaId": "33168C81-6DAE-40D6-9693-68390CD71DA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*",
"matchCriteriaId": "424F9604-AA9A-4D45-A521-0BDEDB723659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC6EBCEB-E52C-4FF5-B15A-6960F58090EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D204E994-4591-403C-8EF3-D3B7BF4AA1A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EBF5418D-1162-4B1E-BC3D-06A3E084BEFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1CA65F31-3D54-4F66-A0A3-2BD993FF38F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*",
"matchCriteriaId": "41ACC9FE-62FF-424B-B4B8-B033FEAF7686",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EB37027-B60F-445A-96CC-57F5F6C3A220",
"versionEndIncluding": "7.29.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FB482A9C-D577-4AEE-A08F-CAFA6586B51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "65AF9B86-A555-4D5E-B24E-9EBF78BCD8CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "60BBDF07-DB97-433E-B542-EFEBE45550DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CA8BE3F8-82ED-4DD7-991E-979E950C98B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*",
"matchCriteriaId": "738AA231-4694-46E8-B559-1594263A9987",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E9E1F171-B887-499A-BF4F-538EBF347811",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*",
"matchCriteriaId": "07AA276A-0EBA-4DC9-951C-8F8159FAC7A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8DEEF534-9AD2-4439-9D69-E91D062C4647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*",
"matchCriteriaId": "63643BE1-C978-4CD2-8ED1-2B979DB0676E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DE829230-AFDB-4131-9C6A-D9D7A66C5B57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B7E8BA30-8087-48D4-AE1B-48326FF826B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*",
"matchCriteriaId": "47970EFF-2F51-4875-A6BD-E30614E13278",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*",
"matchCriteriaId": "52C9B668-3204-41C5-A82E-262BDFA541DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*",
"matchCriteriaId": "08C8EE1E-E186-42D6-8B12-05865C73F261",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EEA3D88B-41B9-4D79-B47D-B3D6058C0C27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*",
"matchCriteriaId": "331A51E4-AA73-486F-9618-5A83965F2436",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F2171C7C-311A-4405-B95F-3A54966FA844",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "857B244C-2AFB-40C7-A893-7C6DE9871BCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6249538E-FBCB-4130-91FB-DA78D7BA45DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83FAF953-6A65-4FAB-BDB5-03B468CD1C9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*",
"matchCriteriaId": "29F8FF1F-A639-4161-9366-62528AAF4C07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*",
"matchCriteriaId": "67CCE31B-ABDA-4F32-BAF1-B1AD0664B3E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9E66A332-ECD1-4452-B444-FB629022FDF0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*",
"matchCriteriaId": "D6DFE2D3-46E2-4D0C-8508-30307D654560",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
"matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E4174F4F-149E-41A6-BBCC-D01114C05F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
"matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL."
},
{
"lang": "es",
"value": "La funci\u00f3n tailMatch en cookie.c en cURL y libcurl antes de v7.30.0 no comprueba correctamente la ruta del dominio al enviar las cookies, lo que permite robar las cookies a atacantes remotos a trav\u00e9s de un sufijo coincidente en el dominio de una URL."
}
],
"evaluatorImpact": "Per http://www.ubuntu.com/usn/USN-1801-1/\r\n\"A security issue affects these releases of Ubuntu and its derivatives:\r\n\r\n Ubuntu 12.10\r\n Ubuntu 12.04 LTS\r\n Ubuntu 11.10\r\n Ubuntu 10.04 LTS\r\n Ubuntu 8.04 LTS\"",
"id": "CVE-2013-1944",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-04-29T22:55:08.560",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://curl.haxx.se/docs/adv_20130412.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0771.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/53044"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/53051"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/53097"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2012/dsa-2660"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:151"
},
{
"source": "secalert@redhat.com",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.osvdb.org/92316"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/59058"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/USN-1801-1"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=950577"
},
{
"source": "secalert@redhat.com",
"url": "https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66"
},
{
"source": "secalert@redhat.com",
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://curl.haxx.se/docs/adv_20130412.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0771.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/53044"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/53051"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/53097"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2012/dsa-2660"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:151"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/92316"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/59058"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-1801-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=950577"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…