This flaw allows an attacker to insert cookies at will into a running programusing libcurl, if the specific series of conditions are met.libcurl performs transfers. In its API, an application creates "easy handles"that are the individual handles for single transfers.libcurl provides a function call that duplicates en easy handle calledcurl_easy_duphandle.Subsequent use of the cloned handle that does not explicitly set a source toload cookies from would then inadvertently load cookies from a file named`none` - if such a file exists and is readable in the current directory of theprogram using libcurl. And if using the correct file format of course.
No PoCs from references.
- https://github.com/alex-grandson/docker-python-example
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/fokypoky/places-list
- https://github.com/industrial-edge/iih-essentials-development-kit
- https://github.com/malinkamedok/devops_sandbox
- https://github.com/p-rex/falcon-Image-Scan-result-to-csv
- https://github.com/testing-felickz/docker-scout-demo