SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   IBM Rational ClearCase Vendors:   IBM
(IBM Issues Fix for IBM Rational ClearCase) libcurl CURLOPT_HTTPHEADER Option Discloses Potentially Sensitive Information to Remote Users
SecurityTracker Alert ID:  1033744
SecurityTracker URL:  http://securitytracker.com/id/1033744
CVE Reference:   CVE-2015-3153   (Links to External Site)
Date:  Oct 6 2015
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 7.1.2, 7.1.2.1, 7.1.2.2, 7.1.2.3, 7.1.2.4, 7.1.2.5, 7.1.2.6, 7.1.2.7, 7.1.2.8, 7.1.2.9, 7.1.2.10, 7.1.2.11, 7.1.2.12, 7.1.2.13, 7.1.2.14, 7.1.2.15, 7.1.2.16, 7.1.2.17, 7.1.2.18, 8.0, 8.0.0.1, 8.0.0.2, 8.0.0.3, 8.0.0.4, 8.0.0.5, 8.0.0.6, 8.0.0.7, 8.0.0.8, 8.0.0.9, 8.0.0.10, 8.0.0.11, 8.0.0.12, 8.0.0.13, 8.0.0.14, 8.0.0.15, 8.0.1, 8.0.1.1, 8.0.1.2, 8.0.1.3, 8.0.1.4, 8.0.1.5, 8.0.1.6, 8.0.1.7, 8.0.1.8
Description:   A vulnerability was reported in cURL. A remote user can obtain potentially sensitive information on the target system. IBM Rational ClearCase is affected.

By default, the CURLOPT_HTTPHEADER option (and the curl command-line '--header' option) sends the custom HTTP header to both the destination host and any intermediate proxy by design. However, some application developers may not expect the header to be sent to the proxy. The proxy or a remote user monitoring the network can obtain potentially sensitive information in the HTTP headers.

The vendor was notified on March 12 2015.

Yehezkel Horowitz and Oren Souroujon reported this vulnerability.

Impact:   A remote user can obtain potentially sensitive information on the target system.
Solution:   IBM has issued a fix for IBM Rational ClearCase.

The IBM advisory is available at:

http://www-01.ibm.com/support/docview.wss?uid=swg21903010

Vendor URL:  www-01.ibm.com/support/docview.wss?uid=swg21903010 (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), Windows (Any)

Message History:   This archive entry is a follow-up to the message listed below.
May 4 2015 libcurl CURLOPT_HTTPHEADER Option Discloses Potentially Sensitive Information to Remote Users



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC