CVE-2023-27533

Public on 2023-03-23
Modified on 2024-02-01
Description
The curl advisory describes this issue as follows:

curl supports communicating using the TELNET protocol and as a part of this it offers users to pass on user name and "telnet options" for the server negotiation.

Due to lack of proper input scrubbing and without it being the documented functionality, curl would pass on user name and telnet options to the server as provided. This could allow users to pass in carefully crafted content that pass on content or do option negotiation without the application intending to do so. In particular if an application for example allows users to provide the data or parts of the data.
Severity
Medium severity
Medium
CVSS v3 Base Score
4.5
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 1 curl 2023-04-13 ALAS-2023-1727 Fixed
Amazon Linux 2 - Core curl 2023-06-05 ALAS2-2023-2070 Fixed
Amazon Linux 2023 curl 2023-06-05 ALAS2023-2023-193 Fixed

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
NVD CVSSv3 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H