curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "12.0.0.3.0"
}
],
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:oracle:essbase:21.2:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "21.2"
}
]
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"fixed": "1.0.1.1"
}
],
"cpe": "cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"introduced": "8.2.0"
},
{
"fixed": "8.2.12"
},
{
"introduced": "9.0.0"
},
{
"fixed": "9.0.6"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "9.1.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "9.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "32"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "33"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "34"
}
]
}
]
}