curl is vulnerable to a SSL CBC IV vulnerability when built to use OpenSSL for the SSL/TLS layer.
This vulnerability has been identified (CVE-2011-3389 aka the "BEAST" attack) and is addressed by OpenSSL already as they have made a work-around to mitigate the problem. When doing so, they figured out that some servers did not work with the work-around and offered a way to disable it.
The bit used to disable the workaround was then added to the generic
SSL_OP_ALL bitmask that SSL clients may use to enable workarounds for better
compatibility with servers. libcurl uses the SSLOPALL bitmask.
While SSL_OP_ALL is documented to enable "rather harmless" workarounds, it
does in this case effectively enable this security vulnerability again.
{
"CWE": {
"desc": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"id": "CWE-924"
},
"last_affected": "7.23.1",
"package": "curl",
"severity": "High",
"www": "https://curl.se/docs/CVE-2011-3389.html",
"affects": "both",
"URL": "https://curl.se/docs/CVE-2011-3389.json"
}