CVE-2023-46218
Summary
| CVE | CVE-2023-46218 |
|---|---|
| State | PUBLISHED |
| Assigner | hackerone |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-12-07 01:15:07 UTC |
| Updated | 2026-05-12 11:16:14 UTC |
| Description | This flaw allows a malicious HTTP server to set "super cookies" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl's function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain. |
Risk And Classification
Primary CVSS: v3.1 6.5 MEDIUM from [email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
EPSS: 0.002130000 probability, percentile 0.436240000 (date 2026-05-12)
Problem Types: NVD-CWE-noinfo | CWE-178 | CWE-178 CWE-178 Improper Handling of Case Sensitivity
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 6.5 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
| 3.1 | ADP | DECLARED | 6.5 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
| 3.1 | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | Secondary | 6.5 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
LowIntegrity
LowAvailability
NoneCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Fedoraproject | Fedora | 39 | All | All | All |
| Application | Haxx | Curl | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Curl | Curl | affected 8.4.0 8.4.0 semver | Not specified |
| CNA | Curl | Curl | unaffected 7.46.0 7.46.0 semver | Not specified |
| ADP | Siemens | SIMATIC S7-1500 CPU 1518-4 PN/DP MFP | affected V3.1.5 * custom | Not specified |
| ADP | Siemens | SIMATIC S7-1500 CPU 1518-4 PN/DP MFP | affected V3.1.5 * custom | Not specified |
| ADP | Siemens | SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP | affected V3.1.5 * custom | Not specified |
| ADP | Siemens | SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP | affected V3.1.5 * custom | Not specified |
| ADP | Siemens | SIPLUS S7-1500 CPU 1518-4 PN/DP MFP | affected V3.1.5 * custom | Not specified |
| ADP | Siemens | RUGGEDCOM ROX MX5000 | affected V2.17.0 custom | Not specified |
| ADP | Siemens | RUGGEDCOM ROX MX5000RE | affected V2.17.0 custom | Not specified |
| ADP | Siemens | RUGGEDCOM ROX RX1400 | affected V2.17.0 custom | Not specified |
| ADP | Siemens | RUGGEDCOM ROX RX1500 | affected V2.17.0 custom | Not specified |
| ADP | Siemens | RUGGEDCOM ROX RX1501 | affected V2.17.0 custom | Not specified |
| ADP | Siemens | RUGGEDCOM ROX RX1510 | affected V2.17.0 custom | Not specified |
| ADP | Siemens | RUGGEDCOM ROX RX1511 | affected V2.17.0 custom | Not specified |
| ADP | Siemens | RUGGEDCOM ROX RX1512 | affected V2.17.0 custom | Not specified |
| ADP | Siemens | RUGGEDCOM ROX RX1524 | affected V2.17.0 custom | Not specified |
| ADP | Siemens | RUGGEDCOM ROX RX1536 | affected V2.17.0 custom | Not specified |
| ADP | Siemens | RUGGEDCOM ROX RX5000 | affected V2.17.0 custom | Not specified |
| ADP | Siemens | SINEC NMS | affected V3.0 SP1 custom | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Debian -- Security Information -- DSA-5587-1 curl | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| cert-portal.siemens.com/productcert/html/ssa-082556.html | 0b142b55-0307-4c5a-b3c9-f314f3fb7c5e | cert-portal.siemens.com | |
| curl.se/docs/CVE-2023-46218.html | af854a3a-2127-422b-91ae-364da2661108 | curl.se | Patch, Vendor Advisory |
| cert-portal.siemens.com/productcert/html/ssa-331112.html | 0b142b55-0307-4c5a-b3c9-f314f3fb7c5e | cert-portal.siemens.com | |
| [SECURITY] Fedora 38 Update: curl-8.0.1-6.fc38 - package-announce - Fedora Mailing-Lists | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | |
| hackerone.com/reports/2212193 | af854a3a-2127-422b-91ae-364da2661108 | hackerone.com | Exploit, Issue Tracking, Patch, Third Party Advisory |
| [SECURITY] [DLA 3692-1] curl security update | af854a3a-2127-422b-91ae-364da2661108 | lists.debian.org | |
| cert-portal.siemens.com/productcert/html/ssa-202008.html | 0b142b55-0307-4c5a-b3c9-f314f3fb7c5e | cert-portal.siemens.com | |
| cert-portal.siemens.com/productcert/html/ssa-093430.html | 0b142b55-0307-4c5a-b3c9-f314f3fb7c5e | cert-portal.siemens.com | |
| CVE-2023-46218 curl Vulnerability in NetApp Products | NetApp Product Security | af854a3a-2127-422b-91ae-364da2661108 | security.netapp.com | |
| [SECURITY] Fedora 39 Update: curl-8.2.1-4.fc39 - package-announce - Fedora Mailing-Lists | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | Mailing List, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 161400 Oracle Enterprise Linux Security Update for curl (ELSA-2024-1129)
- 161458 Oracle Enterprise Linux Security Update for curl (ELSA-2024-1601)
- 199983 Ubuntu Security Notification for curl Vulnerability (USN-6535-1)
- 200122 Ubuntu Security Notification for curl Vulnerability (USN-6641-1)
- 242745 Red Hat Update for curl (RHSA-2024:0434)
- 242756 Red Hat Update for curl (RHSA-2024:0452)
- 242817 Red Hat Update for curl (RHSA-2024:0585)
- 242849 Red Hat Update for curl (RHSA-2024:0428)
- 243026 Red Hat Update for curl (RHSA-2024:1129)
- 243077 Red Hat Update for JBoss Core Services (RHSA-2024:1316)
- 243155 Red Hat Update for curl (RHSA-2024:1601)
- 284810 Fedora Security Update for curl (FEDORA-2023-2121eca964)
- 285105 Fedora Security Update for curl (FEDORA-2023-9de8973300)
- 330168 IBM AIX Multiple Vulnerabilities due to curl (curl_advisory4)
- 379413 BIG-IP cURL Multiple Vulnerabilities (K000138650)
- 503683 Alpine Linux Security Update for curl
- 505865 Alpine Linux Security Update for curl
- 6000399 Debian Security Update for curl (DLA 3692-1)
- 6000401 Debian Security Update for curl (DSA 5587-1)
- 673340 EulerOS Security Update for curl (EulerOS-SA-2024-1310)
- 673556 EulerOS Security Update for curl (EulerOS-SA-2024-1172)
- 673648 EulerOS Security Update for curl (EulerOS-SA-2024-1102)
- 673803 EulerOS Security Update for curl (EulerOS-SA-2024-1260)
- 673830 EulerOS Security Update for curl (EulerOS-SA-2024-1332)
- 673867 EulerOS Security Update for curl (EulerOS-SA-2024-1192)
- 673901 EulerOS Security Update for curl (EulerOS-SA-2024-1117)
- 755460 SUSE Enterprise Linux Security Update for curl (SUSE-SU-2023:4650-1)
- 907726 Common Base Linux Mariner (CBL-Mariner) Security Update for mysql (32126-1)
- 907736 Common Base Linux Mariner (CBL-Mariner) Security Update for curl (32099-1)
- 941607 AlmaLinux Security Update for curl (ALSA-2024:1129)
- 941637 AlmaLinux Security Update for curl (ALSA-2024:1601)
- 961151 Rocky Linux Security Update for curl (RLSA-2024:1601)