CVE-2023-38546
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/10/2023
Last modified:
12/05/2026
Description
This flaw allows an attacker to insert cookies at will into a running program<br />
using libcurl, if the specific series of conditions are met.<br />
<br />
libcurl performs transfers. In its API, an application creates "easy handles"<br />
that are the individual handles for single transfers.<br />
<br />
libcurl provides a function call that duplicates en easy handle called<br />
[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).<br />
<br />
If a transfer has cookies enabled when the handle is duplicated, the<br />
cookie-enable state is also cloned - but without cloning the actual<br />
cookies. If the source handle did not read any cookies from a specific file on<br />
disk, the cloned version of the handle would instead store the file name as<br />
`none` (using the four ASCII letters, no quotes).<br />
<br />
Subsequent use of the cloned handle that does not explicitly set a source to<br />
load cookies from would then inadvertently load cookies from a file named<br />
`none` - if such a file exists and is readable in the current directory of the<br />
program using libcurl. And if using the correct file format of course.
Impact
Base Score 3.x
3.70
Severity 3.x
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:* | 7.9.1 (including) | 8.4.0 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://seclists.org/fulldisclosure/2024/Jan/34
- http://seclists.org/fulldisclosure/2024/Jan/37
- http://seclists.org/fulldisclosure/2024/Jan/38
- https://curl.se/docs/CVE-2023-38546.html
- https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214057
- https://support.apple.com/kb/HT214058
- https://support.apple.com/kb/HT214063
- http://seclists.org/fulldisclosure/2024/Jan/34
- http://seclists.org/fulldisclosure/2024/Jan/37
- http://seclists.org/fulldisclosure/2024/Jan/38
- https://curl.se/docs/CVE-2023-38546.html
- https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868
- https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214057
- https://support.apple.com/kb/HT214058
- https://support.apple.com/kb/HT214063
- https://cert-portal.siemens.com/productcert/html/ssa-082556.html
- https://cert-portal.siemens.com/productcert/html/ssa-093430.html
- https://cert-portal.siemens.com/productcert/html/ssa-832273.html
- https://cert-portal.siemens.com/productcert/html/ssa-943925.html



