Information Exposure Affecting libcurl package, versions [7.76.0,7.77.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.76% (73rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CONAN-LIBCURL-10076419
  • published8 May 2025
  • disclosed11 Jun 2021
  • creditUnknown

Introduced: 11 Jun 2021

CVE-2021-22897  (opens in a new tab)
CWE-668  (opens in a new tab)

How to fix?

Upgrade libcurl to version 7.77.0 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single "static" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.

CVSS Base Scores

version 3.1