Vulnerability Details CVE-2016-8624
curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.025
EPSS Ranking 84.4%
CVSS Severity
CVSS v3 Score 5.3
CVSS v2 Score 5.0
Products affected by CVE-2016-8624
-
-
-
-
-
-
-
cpe:2.3:a:haxx:curl:6.3.1
-
-
-
cpe:2.3:a:haxx:curl:6.5.1
-
cpe:2.3:a:haxx:curl:6.5.2
-
-
cpe:2.3:a:haxx:curl:7.1.1
-
-
cpe:2.3:a:haxx:curl:7.10.1
-
cpe:2.3:a:haxx:curl:7.10.2
-
cpe:2.3:a:haxx:curl:7.10.3
-
cpe:2.3:a:haxx:curl:7.10.4
-
cpe:2.3:a:haxx:curl:7.10.5
-
cpe:2.3:a:haxx:curl:7.10.6
-
cpe:2.3:a:haxx:curl:7.10.7
-
cpe:2.3:a:haxx:curl:7.10.8
-
cpe:2.3:a:haxx:curl:7.11.0
-
cpe:2.3:a:haxx:curl:7.11.1
-
cpe:2.3:a:haxx:curl:7.11.2
-
cpe:2.3:a:haxx:curl:7.12.0
-
cpe:2.3:a:haxx:curl:7.12.1
-
cpe:2.3:a:haxx:curl:7.12.2
-
cpe:2.3:a:haxx:curl:7.12.3
-
cpe:2.3:a:haxx:curl:7.13.0
-
cpe:2.3:a:haxx:curl:7.13.1
-
cpe:2.3:a:haxx:curl:7.13.2
-
cpe:2.3:a:haxx:curl:7.14.0
-
cpe:2.3:a:haxx:curl:7.14.1
-
cpe:2.3:a:haxx:curl:7.15.0
-
cpe:2.3:a:haxx:curl:7.15.1
-
cpe:2.3:a:haxx:curl:7.15.2
-
cpe:2.3:a:haxx:curl:7.15.3
-
cpe:2.3:a:haxx:curl:7.15.4
-
cpe:2.3:a:haxx:curl:7.15.5
-
cpe:2.3:a:haxx:curl:7.16.0
-
cpe:2.3:a:haxx:curl:7.16.1
-
cpe:2.3:a:haxx:curl:7.16.2
-
cpe:2.3:a:haxx:curl:7.16.3
-
cpe:2.3:a:haxx:curl:7.16.4
-
cpe:2.3:a:haxx:curl:7.17.0
-
cpe:2.3:a:haxx:curl:7.17.1
-
cpe:2.3:a:haxx:curl:7.18.0
-
cpe:2.3:a:haxx:curl:7.18.1
-
cpe:2.3:a:haxx:curl:7.18.2
-
cpe:2.3:a:haxx:curl:7.19.0
-
cpe:2.3:a:haxx:curl:7.19.1
-
cpe:2.3:a:haxx:curl:7.19.2
-
cpe:2.3:a:haxx:curl:7.19.3
-
cpe:2.3:a:haxx:curl:7.19.4
-
cpe:2.3:a:haxx:curl:7.19.5
-
cpe:2.3:a:haxx:curl:7.19.6
-
cpe:2.3:a:haxx:curl:7.19.7
-
cpe:2.3:a:haxx:curl:7.19.7-53
-
-
cpe:2.3:a:haxx:curl:7.2.1
-
cpe:2.3:a:haxx:curl:7.20.0
-
cpe:2.3:a:haxx:curl:7.20.1
-
cpe:2.3:a:haxx:curl:7.21.0
-
cpe:2.3:a:haxx:curl:7.21.1
-
cpe:2.3:a:haxx:curl:7.21.2
-
cpe:2.3:a:haxx:curl:7.21.3
-
cpe:2.3:a:haxx:curl:7.21.4
-
cpe:2.3:a:haxx:curl:7.21.5
-
cpe:2.3:a:haxx:curl:7.21.6
-
cpe:2.3:a:haxx:curl:7.21.7
-
cpe:2.3:a:haxx:curl:7.22.0
-
cpe:2.3:a:haxx:curl:7.23.0
-
cpe:2.3:a:haxx:curl:7.23.1
-
cpe:2.3:a:haxx:curl:7.24.0
-
cpe:2.3:a:haxx:curl:7.25.0
-
cpe:2.3:a:haxx:curl:7.26.0
-
cpe:2.3:a:haxx:curl:7.27.0
-
cpe:2.3:a:haxx:curl:7.28.0
-
cpe:2.3:a:haxx:curl:7.28.1
-
cpe:2.3:a:haxx:curl:7.29.0
-
-
cpe:2.3:a:haxx:curl:7.30.0
-
cpe:2.3:a:haxx:curl:7.31.0
-
cpe:2.3:a:haxx:curl:7.32.0
-
cpe:2.3:a:haxx:curl:7.33.0
-
cpe:2.3:a:haxx:curl:7.34.0
-
cpe:2.3:a:haxx:curl:7.35.0
-
cpe:2.3:a:haxx:curl:7.36.0
-
cpe:2.3:a:haxx:curl:7.37.0
-
cpe:2.3:a:haxx:curl:7.37.1
-
cpe:2.3:a:haxx:curl:7.38.0
-
cpe:2.3:a:haxx:curl:7.39.0
-
-
cpe:2.3:a:haxx:curl:7.4.1
-
cpe:2.3:a:haxx:curl:7.4.2
-
cpe:2.3:a:haxx:curl:7.40.0
-
cpe:2.3:a:haxx:curl:7.41.0
-
cpe:2.3:a:haxx:curl:7.42.0
-
cpe:2.3:a:haxx:curl:7.42.1
-
cpe:2.3:a:haxx:curl:7.43.0
-
cpe:2.3:a:haxx:curl:7.44.0
-
cpe:2.3:a:haxx:curl:7.45.0
-
cpe:2.3:a:haxx:curl:7.46.0
-
cpe:2.3:a:haxx:curl:7.47.0
-
cpe:2.3:a:haxx:curl:7.47.1
-
cpe:2.3:a:haxx:curl:7.48.0
-
cpe:2.3:a:haxx:curl:7.49.0
-
cpe:2.3:a:haxx:curl:7.49.1
-
-
cpe:2.3:a:haxx:curl:7.5.1
-
cpe:2.3:a:haxx:curl:7.5.2
-
cpe:2.3:a:haxx:curl:7.50.0
-
cpe:2.3:a:haxx:curl:7.50.1
-
cpe:2.3:a:haxx:curl:7.50.2
-
cpe:2.3:a:haxx:curl:7.50.3
-
-
cpe:2.3:a:haxx:curl:7.6.1
-
-
cpe:2.3:a:haxx:curl:7.7.1
-
cpe:2.3:a:haxx:curl:7.7.2
-
cpe:2.3:a:haxx:curl:7.7.3
-
-
cpe:2.3:a:haxx:curl:7.8.1
-
-
cpe:2.3:a:haxx:curl:7.9.1
-
cpe:2.3:a:haxx:curl:7.9.2
-
cpe:2.3:a:haxx:curl:7.9.3
-
cpe:2.3:a:haxx:curl:7.9.4
-
cpe:2.3:a:haxx:curl:7.9.5
-
cpe:2.3:a:haxx:curl:7.9.6
-
cpe:2.3:a:haxx:curl:7.9.7
-
cpe:2.3:a:haxx:curl:7.9.8