MEDIUM · 5.0

CVE-2015-3153

The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information ...

Vulnerability Description

The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information by reading the header contents.

CVSS Score

5.0

MEDIUM

AV:N/AC:L/Au:N/C:P/I:N/A:N
Confidentiality
PARTIAL
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
OracleEnterprise Manager Ops Center<= 12.1.3
HaxxCurl<= 7.42.0
HaxxLibcurl<= 7.42.0
CanonicalUbuntu Linux12.04
AppleMac Os X10.10.4
DebianDebian Linux8.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-3153?

CVE-2015-3153 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information ...

How severe is CVE-2015-3153?

CVE-2015-3153 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-3153?

Check the references section above for vendor advisories and patch information. Affected products include: Oracle Enterprise Manager Ops Center, Haxx Curl, Haxx Libcurl, Canonical Ubuntu Linux, Apple Mac Os X.