curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Patch Third Party Advisory |
https://curl.se/docs/CVE-2020-8177.html | Vendor Advisory |
https://hackerone.com/reports/887462 | Exploit Third Party Advisory |
https://www.debian.org/security/2021/dsa-4881 | Third Party Advisory |
https://www.oracle.com/security-alerts/cpujan2022.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
|
Configuration 16 (hide)
|
History
27 Mar 2024, 16:04
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:* cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:* |
|
First Time |
Splunk universal Forwarder
Splunk |
17 Jun 2022, 18:45
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 7.8 |
19 Apr 2022, 15:43
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:* | |
References | (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf - Patch, Third Party Advisory |
10 Mar 2022, 17:41
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Mar 2022, 20:34
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:fujitsu:m12-1:-:*:*:*:*:*:*:* cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:fujitsu:m12-2:-:*:*:*:*:*:*:* cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:fujitsu:m10-1:-:*:*:*:*:*:*:* cpe:2.3:h:fujitsu:m10-4:-:*:*:*:*:*:*:* cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:* cpe:2.3:h:fujitsu:m12-2s:-:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:* |
|
References | (MISC) https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2021/dsa-4881 - Third Party Advisory |
07 Feb 2022, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2020-12-14 20:15
Updated : 2024-03-27 16:04
NVD link : CVE-2020-8177
Mitre link : CVE-2020-8177
CVE.ORG link : CVE-2020-8177
JSON object : View
Products Affected
debian
- debian_linux
fujitsu
- m10-1_firmware
- m10-4_firmware
- m10-4s
- m12-1
- m12-2s_firmware
- m10-1
- m10-4
- m10-4s_firmware
- m12-2s
- m12-1_firmware
- m12-2_firmware
- m12-2
siemens
- sinec_infrastructure_network_services
haxx
- curl
splunk
- universal_forwarder