CURL-CVE-2019-5443

Source
https://curl.se/docs/CVE-2019-5443.html
Import Source
https://curl.se/docs/CURL-CVE-2019-5443.json
JSON Data
https://api.test.osv.dev/v1/vulns/CURL-CVE-2019-5443
Aliases
Published
2019-06-24T08:00:00Z
Modified
2025-01-07T11:34:40Z
Summary
Windows OpenSSL engine code injection
Details

A non-privileged user or program can put code and a config file in a known non-privileged path (under C:/usr/local/) that makes curl automatically run the code (as an OpenSSL "engine") on invocation. If that curl is invoked by a privileged user it can do anything it wants.

This flaw exists in the official curl-for-windows binaries built and hosted by the curl project (all versions up to and including 7.65.1_1). It does not exist in the curl executable shipped by Microsoft, bundled with Windows 10. It possibly exists in other curl builds for Windows too that uses OpenSSL.

The curl project has provided official curl executable builds for Windows since late August 2018.

There exists proof of concept exploits of this flaw.

Database specific
{
    "package": "curl",
    "issue": "https://hackerone.com/reports/608577",
    "last_affected": "7.65.1",
    "award": {
        "currency": "USD",
        "amount": "200"
    },
    "CWE": {
        "desc": "Improper Control of Generation of Code ('Code Injection')",
        "id": "CWE-94"
    },
    "www": "https://curl.se/docs/CVE-2019-5443.html",
    "affects": "both",
    "URL": "https://curl.se/docs/CVE-2019-5443.json",
    "severity": "High"
}
References
Credits
    • Rich Mirch - FINDER
    • Viktor Szakats - REMEDIATION_DEVELOPER

Affected packages

Git /

Affected ranges

Type
SEMVER
Events
Introduced
7.44.0
Fixed
7.66.0

Affected versions

7.*
7.44.0
7.45.0
7.46.0
7.47.0
7.47.1
7.48.0
7.49.0
7.49.1
7.50.0
7.50.1
7.50.2
7.50.3
7.51.0
7.52.0
7.52.1
7.53.0
7.53.1
7.54.0
7.54.1
7.55.0
7.55.1
7.56.0
7.56.1
7.57.0
7.58.0
7.59.0
7.60.0
7.61.0
7.61.1
7.62.0
7.63.0
7.64.0
7.64.1
7.65.0
7.65.1

Database specific

source
"https://curl.se/docs/CURL-CVE-2019-5443.json"