Description
curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-711-1 | curl security update |
Debian DSA |
DSA-3705-1 | curl security update |
EUVD |
EUVD-2016-9469 | curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them. |
Ubuntu USN |
USN-3123-1 | curl vulnerabilities |
References
History
Thu, 16 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-04-16T13:40:01.012Z
Reserved: 2016-10-12T00:00:00.000Z
Link: CVE-2016-8624
Updated: 2024-08-06T02:27:41.205Z
Status : Modified
Published: 2018-07-31T21:29:00.367
Modified: 2024-11-21T02:59:42.323
Link: CVE-2016-8624
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN