Vulnerability Details CVE-2024-11053
When asked to both use a `.netrc` file for credentials and to follow HTTP
redirects, curl could leak the password used for the first host to the
followed-to host under certain circumstances.
This flaw only manifests itself if the netrc file has an entry that matches
the redirect target hostname but the entry either omits just the password or
omits both login and password.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 40.3%
CVSS Severity
CVSS v3 Score 3.4
Products affected by CVE-2024-11053
-
cpe:2.3:a:haxx:curl:7.76.0
-
cpe:2.3:a:haxx:curl:7.76.1
-
cpe:2.3:a:haxx:curl:7.77.0
-
cpe:2.3:a:haxx:curl:7.78.0
-
cpe:2.3:a:haxx:curl:7.79.0
-
cpe:2.3:a:haxx:curl:7.79.1
-
cpe:2.3:a:haxx:curl:7.80.0
-
cpe:2.3:a:haxx:curl:7.81.0
-
cpe:2.3:a:haxx:curl:7.82.0
-
cpe:2.3:a:haxx:curl:7.83.0
-
cpe:2.3:a:haxx:curl:7.83.1
-
cpe:2.3:a:haxx:curl:7.84.0
-
cpe:2.3:a:haxx:curl:7.85.0
-
cpe:2.3:a:haxx:curl:7.86.0
-
cpe:2.3:a:haxx:curl:7.87.0
-
cpe:2.3:a:haxx:curl:7.88.0
-
cpe:2.3:a:haxx:curl:7.88.1
-
cpe:2.3:a:haxx:curl:8.0.0
-
cpe:2.3:a:haxx:curl:8.0.1
-
cpe:2.3:a:haxx:curl:8.1.0
-
cpe:2.3:a:haxx:curl:8.1.1
-
cpe:2.3:a:haxx:curl:8.1.2
-
cpe:2.3:a:haxx:curl:8.10.0
-
cpe:2.3:a:haxx:curl:8.10.1
-
cpe:2.3:a:haxx:curl:8.11.0
-
cpe:2.3:a:haxx:curl:8.2.0
-
cpe:2.3:a:haxx:curl:8.2.1
-
cpe:2.3:a:haxx:curl:8.4.0
-
cpe:2.3:a:haxx:curl:8.5.0
-
cpe:2.3:a:haxx:curl:8.6.0
-
cpe:2.3:a:haxx:curl:8.7.0
-
cpe:2.3:a:haxx:curl:8.7.1
-
cpe:2.3:a:haxx:curl:8.8.0
-
cpe:2.3:a:haxx:curl:8.9.0
-
cpe:2.3:a:haxx:curl:8.9.1
-
-
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-
-
-
-
-
-
-
-
-
cpe:2.3:h:netapp:hci_compute_node:-
-
cpe:2.3:o:netapp:bootstrap_os:-
-
cpe:2.3:o:netapp:h300s_firmware:-
-
cpe:2.3:o:netapp:h410s_firmware:-
-
cpe:2.3:o:netapp:h500s_firmware:-
-
cpe:2.3:o:netapp:h610c_firmware:-
-
cpe:2.3:o:netapp:h610s_firmware:-
-
cpe:2.3:o:netapp:h615c_firmware:-
-
cpe:2.3:o:netapp:h700s_firmware:-