CURL-CVE-2025-0167

Source
https://curl.se/docs/CVE-2025-0167.html
Import Source
https://curl.se/docs/CURL-CVE-2025-0167.json
JSON Data
https://api.osv.dev/v1/vulns/CURL-CVE-2025-0167
Aliases
Published
2025-02-05T08:00:00Z
Modified
2025-02-05T08:27:09.023899Z
Summary
netrc and default credential leak
Details

When asked to use a .netrc file for credentials and to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances.

This flaw only manifests itself if the netrc file has a default entry that omits both login and password. A rare circumstance.

Database specific
{
    "CWE": {
        "id": "CWE-200",
        "desc": "Exposure of Sensitive Information to an Unauthorized Actor"
    },
    "award": {
        "amount": "505",
        "currency": "USD"
    },
    "URL": "https://curl.se/docs/CVE-2025-0167.json",
    "package": "curl",
    "severity": "Low",
    "issue": "https://hackerone.com/reports/2917232",
    "www": "https://curl.se/docs/CVE-2025-0167.html",
    "last_affected": "8.11.1"
}
References
Credits
    • Yihang Zhou - FINDER
    • Daniel Stenberg - REMEDIATION_DEVELOPER

Affected packages

Git / github.com/curl/curl.git

Affected ranges

Type
SEMVER
Events
Introduced
7.76.0
Fixed
8.12.0
Type
GIT
Repo
https://github.com/curl/curl.git
Events

Affected versions

7.*

7.76.0
7.76.1
7.77.0
7.78.0
7.79.0
7.79.1
7.80.0
7.81.0
7.82.0
7.83.0
7.83.1
7.84.0
7.85.0
7.86.0
7.87.0
7.88.0
7.88.1

8.*

8.0.0
8.0.1
8.1.0
8.1.1
8.1.2
8.10.0
8.10.1
8.11.0
8.11.1
8.2.0
8.2.1
8.3.0
8.4.0
8.5.0
8.6.0
8.7.0
8.7.1
8.8.0
8.9.0
8.9.1