Impact
The vulnerability afflicts cURL, the popular command‑line tool and library for handling network requests. When cURL is configured to use distinct proxy servers for different URL schemes, a redirection that moves from a URL accessed through an authenticated proxy to a URL that uses an unauthenticated proxy can inadvertently leak the credentials of the original authenticated proxy. The CNA lists this weakness as both CWE‑201, a credential disclosure vulnerability, and CWE‑522, which highlights improper handling or storage of credentials. An attacker who can observe or influence the traffic generated by a configured curl instance could capture these credentials and use them to gain unauthorized network access or to learn sensitive configuration details.
Affected Systems
This flaw impacts all cURL installations—the command‑line tool and the libcurl library—regardless of platform, because no specific version numbers were supplied by the CNA. Given the absence of a version range, any release that still follows the legacy proxy handling model is potentially affected, until the issue is fixed in a newer version.
Risk and Exploitability
With a CVSS score of 5.9 the flaw is moderate in severity. The EPSS score is < 1% (0.00043) and the vulnerability is not listed in the CISA KEV catalog, indicating that broad exploitation is unlikely at present. The attack requires a curl configuration that uses separate proxies for different URL schemes and a subsequent redirect that changes the proxy context. Based on the description, the attacker must either monitor traffic to the curl instance or actively influence the redirect to capture the leaked credentials—a relatively constrained ad‑hoc scenario.
OpenCVE Enrichment
Ubuntu USN