Hi Utkarsh, all

Is this even a vulnerability?
The problem is that authentication information is not stripped if the
browser is redirected to another place.

If you trust a site enough to provide authentication data, I guess you also
trust that if that site happens to be relocated you should also trust the
new place.
I mean if the attacker has the power to redirect I expect that it has the
power to read the authentication data anyway. There could be cases when
this is not the case, but in general it should not be possible for the
attacker to redirect without also having more power.

We could of course consider to apply this fix, but it certainly will cause
a regression since my expectation is that authentication information is
forwarded.

I think it should be ignored. If we fix it, it should be with a
configuration option, but I think that is a little too intrusive for (E)LTS.

Or have I missed something?

Best regards

// Ola

On Mon, 5 Apr 2021 at 02:20, Utkarsh Gupta <utka...@debian.org> wrote:

> Hello,
>
> [CCing the Security team in case they have some ideas or suggestions
> for CVE-2021-22876/curl]
>
> Whilst triaging and looking thoroughly for this CVE, affecting curl, I
> noticed that the upstream patch uses elements like CURLU,
> CURLUPART_{URL,FRAGMENT,USER,PASSWORD}. This comes from the URL API
> which seems to be missing in both, stretch and jessie.
>
> There seem to be two plausible options at this point:
>
> 1. Given that this CVE has been assigned low severity by upstream, we
> could perhaps mark this as no-dsa or ignored, with an appropriate
> comment; or
>
> 2. Backport the entire URL API (patch for that is attached; is
> intrusive) and then apply the fix for CVE-2021-22876 (patch attached)
> on top of that. Whilst this option makes sense, but backporting the
> entire URL API could have an unforeseen effect (or chances of
> potential regressions) and in any case, looks somewhat intrusive.
>
> So for now, I've added curl to dla-needed and ela-needed but if we
> decide to mark this as no-dsa or ignored, we could simply drop this
> from there as this is the only CVE that needs working on.
>
> Let me know what y'all think.
>
>
> - u
>


-- 
 --- Inguza Technology AB --- MSc in Information Technology ----
|  o...@inguza.com                    o...@debian.org            |
|  http://inguza.com/                Mobile: +46 (0)70-332 1551 |
 ---------------------------------------------------------------

Reply via email to