Open mend-for-github-com[bot] opened 1 year ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
CVE-2023-27534 - High Severity Vulnerability
Vulnerable Library - miranda-ngc4f2f0a8c643304f73cdbea1299c00cf19e8986c
Miranda NG: Next Generation of Miranda IM
Library home page: https://github.com/miranda-ng/miranda-ng.git
Found in HEAD commit: 30207a8f9a2b5d0b116c65f1e59dfdeba6de5c3e
Found in base branch: main
Vulnerable Source Files (1)
/edrav2/eprj/curl/lib/curl_path.c
Vulnerability Details
A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.
Publish Date: 2023-03-30
URL: CVE-2023-27534
CVSS 3 Score Details (8.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://seclists.org/oss-sec/2023/q1/175
Release Date: 2023-03-03
Fix Resolution: curl-8_0_0