CURL-CVE-2016-8624

Source
https://curl.se/docs/CVE-2016-8624.html
Import Source
https://curl.se/docs/CURL-CVE-2016-8624.json
JSON Data
https://api.test.osv.dev/v1/vulns/CURL-CVE-2016-8624
Aliases
Published
2016-11-02T08:00:00Z
Modified
2024-06-07T13:53:51Z
Summary
invalid URL parsing with '#'
Details

curl does not parse the authority component of the URL correctly when the host name part ends with a hash (#) character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use a URL parser that follows the RFC to check for allowed domains before using curl to request them.

Passing in http://example.com#@evil.com/x.txt would wrongly make curl send a request to evil.com while your browser would connect to example.com given the same URL.

The problem exists for most protocol schemes.

Database specific
{
    "last_affected": "7.50.3",
    "CWE": {
        "desc": "Encoding Error",
        "id": "CWE-172"
    },
    "URL": "https://curl.se/docs/CVE-2016-8624.json",
    "www": "https://curl.se/docs/CVE-2016-8624.html",
    "package": "curl",
    "severity": "Medium",
    "affects": "both"
}
References
Credits
    • Fernando Muñoz - FINDER
    • Daniel Stenberg - REMEDIATION_DEVELOPER

Affected packages

Git / github.com/curl/curl.git

Affected ranges

Type
SEMVER
Events
Introduced
6.0
Fixed
7.51.0
Type
GIT
Repo
https://github.com/curl/curl.git
Events

Affected versions

6.*

6.0
6.1
6.2
6.3
6.3.1
6.4
6.5
6.5.1
6.5.2

7.*

7.1
7.1.1
7.10
7.10.1
7.10.2
7.10.3
7.10.4
7.10.5
7.10.6
7.10.7
7.10.8
7.11.0
7.11.1
7.11.2
7.12.0
7.12.1
7.12.2
7.12.3
7.13.0
7.13.1
7.13.2
7.14.0
7.14.1
7.15.0
7.15.1
7.15.2
7.15.3
7.15.4
7.15.5
7.16.0
7.16.1
7.16.2
7.16.3
7.16.4
7.17.0
7.17.1
7.18.0
7.18.1
7.18.2
7.19.0
7.19.1
7.19.2
7.19.3
7.19.4
7.19.5
7.19.6
7.19.7
7.2
7.2.1
7.20.0
7.20.1
7.21.0
7.21.1
7.21.2
7.21.3
7.21.4
7.21.5
7.21.6
7.21.7
7.22.0
7.23.0
7.23.1
7.24.0
7.25.0
7.26.0
7.27.0
7.28.0
7.28.1
7.29.0
7.3
7.30.0
7.31.0
7.32.0
7.33.0
7.34.0
7.35.0
7.36.0
7.37.0
7.37.1
7.38.0
7.39.0
7.4
7.4.1
7.4.2
7.40.0
7.41.0
7.42.0
7.42.1
7.43.0
7.44.0
7.45.0
7.46.0
7.47.0
7.47.1
7.48.0
7.49.0
7.49.1
7.5
7.5.1
7.5.2
7.50.0
7.50.1
7.50.2
7.50.3
7.6
7.6.1
7.7
7.7.1
7.7.2
7.7.3
7.8
7.8.1
7.9
7.9.1
7.9.2
7.9.3
7.9.4
7.9.5
7.9.6
7.9.7
7.9.8

Database specific

{
    "vanir_signatures": [
        {
            "signature_type": "Function",
            "target": {
                "file": "lib/url.c",
                "function": "parseurlandfillconn"
            },
            "id": "CURL-CVE-2016-8624-21dabb6c",
            "digest": {
                "length": 5303.0,
                "function_hash": "192314251346490770842994228226152588855"
            },
            "source": "https://github.com/curl/curl.git/commit/3bb273db7e40ebc284cff45f3ce3f0475c8339c2",
            "deprecated": false,
            "signature_version": "v1"
        },
        {
            "signature_type": "Line",
            "target": {
                "file": "lib/url.c"
            },
            "id": "CURL-CVE-2016-8624-e5a561b6",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "167794969187132834335283326240322298758",
                    "2145756531567107512094677782452244826",
                    "323747900718285867694470904862247761631",
                    "72199516645593183555100184296947424249",
                    "103006003645429430163277688968008968563",
                    "175770485043618483373585366884754774864",
                    "129035539822800012486235675867282881458",
                    "185182450701402718154549178776349809532",
                    "70106979273968636074962406029356647628",
                    "56254145538747740195693065556051579026",
                    "168788442069164588453201833074777156037",
                    "170526936898557974342460186685632420595"
                ]
            },
            "source": "https://github.com/curl/curl.git/commit/3bb273db7e40ebc284cff45f3ce3f0475c8339c2",
            "deprecated": false,
            "signature_version": "v1"
        }
    ]
}