CVE-2021-22876 log

Source
Severity Medium
Remote Yes
Type Information disclosure
Description
libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.

libcurl automatically sets the Referer: HTTP request header field in outgoing HTTP requests if the CURLOPT_AUTOREFERER option is set. With the curl tool, it is enabled with --referer ";auto".

The issue has existed in libcurl since version 7.1.1 and is fixed in version 7.76.0.
Group Package Affected Fixed Severity Status Ticket
AVG-1758 lib32-libcurl-gnutls 7.75.0-1 7.76.0-1 Medium Fixed
AVG-1757 libcurl-gnutls 7.75.0-1 7.76.0-1 Medium Fixed
AVG-1756 lib32-libcurl-compat 7.75.0-1 7.76.0-1 High Fixed
AVG-1755 libcurl-compat 7.75.0-1 7.76.0-1 High Fixed
AVG-1754 lib32-curl 7.75.0-1 7.76.0-1 High Fixed
AVG-1753 curl 7.75.0-1 7.76.0-1 High Fixed
References
https://curl.se/docs/CVE-2021-22876.html
https://github.com/curl/curl/commit/7214288898f5625a6cc196e22a74232eada7861c
Notes
Workaround
==========

The issue can be mitigated by providing the credentials with -u or CURLOPT_USERPWD, or by avoiding ACURLOPT_AUTOREFERER and --referer ";auto".