[asterisk-bugs] [JIRA] (ASTERISK-24676) Security Vulnerability: URL request injection in libCURL (CVE-2014-8150)

Matt Jordan (JIRA) noreply at issues.asterisk.org
Wed Jan 28 17:20:38 CST 2015


     [ https://issues.asterisk.org/jira/browse/ASTERISK-24676?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Matt Jordan updated ASTERISK-24676:
-----------------------------------

    Target Release Version/s: 1.8.32.2
                              11.15.1
                              12.8.1
                              13.1.1

> Security Vulnerability: URL request injection in libCURL (CVE-2014-8150)
> ------------------------------------------------------------------------
>
>                 Key: ASTERISK-24676
>                 URL: https://issues.asterisk.org/jira/browse/ASTERISK-24676
>             Project: Asterisk
>          Issue Type: Bug
>          Components: Functions/func_curl, Resources/res_config_curl
>    Affects Versions: 1.8.32.1, 11.15.0, 12.8.0, 13.1.0
>            Reporter: Matt Jordan
>            Assignee: Mark Michelson
>              Labels: Security
>      Target Release: 1.8.32.2, 11.15.1, 12.8.1, 13.1.1
>
>
> Thanks to Olle Johansson for pointing this out.
> Quoting from the CVE notice on the {{cURL}} page:
> {quote}
> When libcurl sends a request to a server via a HTTP proxy, it copies the entire URL into the request and sends if off.
> If the given URL contains line feeds and carriage returns those will be sent along to the proxy too, which allows the program to for example send a separate HTTP request injected embedded in the URL.
> Many programs allow some kind of external sources to set the URL or provide partial pieces for the URL to ask for, and if the URL as received from the user is not stripped good enough this flaw allows malicious users to do additional requests in a way that was not intended, or just to insert request headers into the request that the program didn't intend.
> We are not aware of any exploit of this flaw.
> {quote}
> Generally, if a URL contains {{\r\n}} (or some equivalent thereof), we should reject the URL.
> While this clearly affects {{func_curl}}, {{res_config_curl}} is also affected, as it passes the query from the {{REALTIME}} function directly to {{cURL}} as well.



--
This message was sent by Atlassian JIRA
(v6.2#6252)



More information about the asterisk-bugs mailing list