CVE-2023-27534

Publication date 20 March 2023

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

8.8 · High

Score breakdown

A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.

Status

Package Ubuntu Release Status
curl 23.04 lunar
Fixed 7.88.1-6ubuntu2
22.10 kinetic
Fixed 7.85.0-1ubuntu0.5
22.04 LTS jammy
Fixed 7.81.0-1ubuntu1.10
20.04 LTS focal
Fixed 7.68.0-1ubuntu2.18
18.04 LTS bionic
Fixed 7.58.0-2ubuntu3.24
16.04 LTS xenial
Not affected
14.04 LTS trusty
Not affected

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
curl

Severity score breakdown

Parameter Value
Base score 8.8 · High
Attack vector Network
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

References

Related Ubuntu Security Notices (USN)

Other references