CVE-2024-11053
moderate-risk
Published 2024-12-11
When asked to both use a `.netrc` file for credentials and to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has an entry that matches the redirect target hostname but the entry either omits just the password or omits both login and password.
Do I need to act?
-
0.95% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.4/10
Low
NETWORK
/ HIGH complexity
Affected Products (11)
References (7)
Vendor Advisory
https://curl.se/docs/CVE-2024-11053.html
Vendor Advisory
https://curl.se/docs/CVE-2024-11053.json
Third Party Advisory
https://security.netapp.com/advisory/ntap-20250124-0012/
Third Party Advisory
https://security.netapp.com/advisory/ntap-20250131-0003/
31
/ 100
moderate-risk
Severity
12/34 · Low
Exploitability
3/34 · Minimal
Exposure
16/34 · Moderate