Description
A non-privileged user or program can put code and a config file in a known non-privileged path (under C:/usr/local/) that will make curl <= 7.65.1 automatically run the code (as an openssl "engine") on invocation. If that curl is invoked by a privileged user it can do anything it wants.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-15030 | A non-privileged user or program can put code and a config file in a known non-privileged path (under C:/usr/local/) that will make curl <= 7.65.1 automatically run the code (as an openssl "engine") on invocation. If that curl is invoked by a privileged user it can do anything it wants. |
References
History
No history.
Subscriptions
Haxx
Subscribe
Curl
Subscribe
Microsoft
Subscribe
Windows
Subscribe
Netapp
Subscribe
Oncommand Insight
Subscribe
Oncommand Unified Manager
Subscribe
Oncommand Workflow Automation
Subscribe
Snapcenter
Subscribe
Oracle
Subscribe
Enterprise Manager Ops Center
Subscribe
Http Server
Subscribe
Mysql Server
Subscribe
Oss Support Tools
Subscribe
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-08-04T19:54:53.552Z
Reserved: 2019-01-04T00:00:00.000Z
Link: CVE-2019-5443
No data.
Status : Modified
Published: 2019-07-02T19:15:10.790
Modified: 2024-11-21T04:44:56.657
Link: CVE-2019-5443
OpenCVE Enrichment
No data.
EUVD