FreeBSD : cURL -- URL request injection vulnerability (caa98ffd-0a92-40d0-b234-fd79b429157e)

medium Nessus Plugin ID 80453

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

cURL reports :

When libcurl sends a request to a server via a HTTP proxy, it copies the entire URL into the request and sends if off. If the given URL contains line feeds and carriage returns those will be sent along to the proxy too, which allows the program to for example send a separate HTTP request injected embedded in the URL. Many programs allow some kind of external sources to set the URL or provide partial pieces for the URL to ask for, and if the URL as received from the user is not stripped good enough this flaw allows malicious users to do additional requests in a way that was not intended, or just to insert request headers into the request that the program didn't intend. We are not aware of any exploit of this flaw.

Solution

Update the affected package.

See Also

https://curl.haxx.se/docs/CVE-2014-8150.html

http://www.nessus.org/u?b37e825c

Plugin Details

Severity: Medium

ID: 80453

File Name: freebsd_pkg_caa98ffd0a9240d0b234fd79b429157e.nasl

Version: 1.6

Type: local

Published: 1/12/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/o:freebsd:freebsd, p-cpe:/a:freebsd:freebsd:curl

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 1/9/2015

Vulnerability Publication Date: 12/25/2014

Reference Information

CVE: CVE-2014-8150