CVE-2021-22898
moderate-risk
Published 2021-06-11
curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.
Do I need to act?
-
0.13% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.1/10
Low
NETWORK
/ HIGH complexity
Affected Products (15)
References (28)
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
Third Party Advisory
https://www.debian.org/security/2022/dsa-5197
and 8 more references
30
/ 100
moderate-risk
Severity
11/34 · Low
Exploitability
1/34 · Minimal
Exposure
18/34 · Moderate