CVE-2021-22898

CVSS V2 Low 2.6 CVSS V3 Low 3.1
Description
curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.
Overview
  • CVE ID
  • CVE-2021-22898
  • Assigner
  • support@hackerone.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2021-06-11T16:15:11
  • Last Modified Date
  • 2022-08-30T19:09:50
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:* 1 OR 7.7 7.76.1
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.11.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.8.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:1.15.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:essbase:*:*:*:*:*:*:*:* 1 OR 11.1.2.4.047
cpe:2.3:a:oracle:essbase:*:*:*:*:*:*:*:* 1 OR 21.0 21.3
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:* 1 OR 5.7.34
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:* 1 OR 8.0.15 8.0.25
cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:* 1 OR 1.0.1.1
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:H/Au:N/C:P/I:N/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • HIGH
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • NONE
  • Availability Impact
  • NONE
  • Base Score
  • 2.6
  • Severity
  • LOW
  • Exploitability Score
  • 4.9
  • Impact Score
  • 2.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • HIGH
  • Privileges Required
  • NONE
  • User Interaction
  • REQUIRED
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • LOW
  • Availability Impact
  • NONE
  • Base Score
  • 3.1
  • Base Severity
  • LOW
  • Exploitability Score
  • 1.6
  • Impact Score
  • 1.4
History
Created Old Value New Value Data Type Notes
2022-04-20 16:59:27 Added to TrackCVE
2022-12-05 04:17:29 cve-assignments@hackerone.com support@hackerone.com CVE Assigner updated
2022-12-05 04:17:29 2021-06-11T16:15Z 2021-06-11T16:15:11 CVE Published Date updated
2022-12-05 04:17:29 2022-08-30T19:09:50 CVE Modified Date updated
2022-12-05 04:17:29 Analyzed Vulnerability Status updated
2022-12-05 04:17:33 References updated