Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2023-38546

Description

This flaw allows an attacker to insert cookies at will into a running programusing libcurl, if the specific series of conditions are met.libcurl performs transfers. In its API, an application creates "easy handles"that are the individual handles for single transfers.libcurl provides a function call that duplicates en easy handle calledcurl_easy_duphandle.Subsequent use of the cloned handle that does not explicitly set a source toload cookies from would then inadvertently load cookies from a file named`none` - if such a file exists and is readable in the current directory of theprogram using libcurl. And if using the correct file format of course.

POC

Reference

No PoCs from references.

Github

- https://github.com/alex-grandson/docker-python-example

- https://github.com/fkie-cad/nvd-json-data-feeds

- https://github.com/fokypoky/places-list

- https://github.com/industrial-edge/iih-essentials-development-kit

- https://github.com/malinkamedok/devops_sandbox

- https://github.com/p-rex/falcon-Image-Scan-result-to-csv

- https://github.com/testing-felickz/docker-scout-demo