Description
When saving HSTS data to an excessively long file name, curl could end up
removing all contents, making subsequent requests using that file unaware of
the HSTS status they should otherwise use.
Published: 2023-12-12
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-5587-1 curl security update
Ubuntu USN Ubuntu USN USN-6535-1 curl vulnerabilities
History

Tue, 02 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 04 Nov 2025 20:30:00 +0000


Thu, 13 Feb 2025 17:30:00 +0000

Type Values Removed Values Added
Description When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use. When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use.

Subscriptions

Fedoraproject Fedora
Haxx Curl
Redhat Jboss Core Services
cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2025-12-02T20:03:27.875Z

Reserved: 2023-10-19T01:00:12.854Z

Link: CVE-2023-46219

cve-icon Vulnrichment

Updated: 2025-11-04T19:25:34.066Z

cve-icon NVD

Status : Modified

Published: 2023-12-12T02:15:06.990

Modified: 2025-12-02T20:15:48.023

Link: CVE-2023-46219

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-12-06T07:00:00Z

Links: CVE-2023-46219 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses