{"id":"CURL-CVE-2023-27538","summary":"SSH connection too eager reuse still","details":"libcurl would reuse a previously created connection even when an SSH related\noption had been changed that should have prohibited reuse.\n\nlibcurl keeps previously used connections in a connection pool for subsequent\ntransfers to reuse if one of them matches the setup. However, two SSH settings\nwere left out from the configuration match checks, making them match too\neasily.","aliases":["CVE-2023-27538"],"modified":"2025-05-15T17:48:29Z","published":"2023-03-20T08:00:00Z","database_specific":{"affects":"both","last_affected":"7.88.1","URL":"https://curl.se/docs/CVE-2023-27538.json","issue":"https://hackerone.com/reports/1898475","www":"https://curl.se/docs/CVE-2023-27538.html","package":"curl","CWE":{"desc":"Authentication Bypass by Primary Weakness","id":"CWE-305"},"award":{"currency":"USD","amount":"480"},"severity":"Low"},"affected":[{"ranges":[{"type":"SEMVER","events":[{"introduced":"7.16.1"},{"fixed":"8.0.0"}]},{"type":"GIT","repo":"https://github.com/curl/curl.git","events":[{"introduced":"2147284cad624325f5b0034c2f394db62086d9e6"},{"fixed":"af369db4d3833272b8ed443f7fcc2e757a0872eb"}]}],"versions":["7.88.1","7.88.0","7.87.0","7.86.0","7.85.0","7.84.0","7.83.1","7.83.0","7.82.0","7.81.0","7.80.0","7.79.1","7.79.0","7.78.0","7.77.0","7.76.1","7.76.0","7.75.0","7.74.0","7.73.0","7.72.0","7.71.1","7.71.0","7.70.0","7.69.1","7.69.0","7.68.0","7.67.0","7.66.0","7.65.3","7.65.2","7.65.1","7.65.0","7.64.1","7.64.0","7.63.0","7.62.0","7.61.1","7.61.0","7.60.0","7.59.0","7.58.0","7.57.0","7.56.1","7.56.0","7.55.1","7.55.0","7.54.1","7.54.0","7.53.1","7.53.0","7.52.1","7.52.0","7.51.0","7.50.3","7.50.2","7.50.1","7.50.0","7.49.1","7.49.0","7.48.0","7.47.1","7.47.0","7.46.0","7.45.0","7.44.0","7.43.0","7.42.1","7.42.0","7.41.0","7.40.0","7.39.0","7.38.0","7.37.1","7.37.0","7.36.0","7.35.0","7.34.0","7.33.0","7.32.0","7.31.0","7.30.0","7.29.0","7.28.1","7.28.0","7.27.0","7.26.0","7.25.0","7.24.0","7.23.1","7.23.0","7.22.0","7.21.7","7.21.6","7.21.5","7.21.4","7.21.3","7.21.2","7.21.1","7.21.0","7.20.1","7.20.0","7.19.7","7.19.6","7.19.5","7.19.4","7.19.3","7.19.2","7.19.1","7.19.0","7.18.2","7.18.1","7.18.0","7.17.1","7.17.0","7.16.4","7.16.3","7.16.2","7.16.1"],"database_specific":{"vanir_signatures":[{"target":{"file":"lib/url.c"},"id":"CURL-CVE-2023-27538-74a31a15","deprecated":false,"digest":{"threshold":0.9,"line_hashes":["338388686515797258266451303957894254353","222141256028459043771660028298736702271","46581524501082168064056451277175587456","65407390111799823910489920946582965832"]},"signature_version":"v1","signature_type":"Line","source":"https://github.com/curl/curl.git/commit/af369db4d3833272b8ed443f7fcc2e757a0872eb"},{"target":{"function":"ConnectionExists","file":"lib/url.c"},"id":"CURL-CVE-2023-27538-7c49d0fe","deprecated":false,"digest":{"length":7547,"function_hash":"25528379942100198235893743428038418293"},"signature_version":"v1","signature_type":"Function","source":"https://github.com/curl/curl.git/commit/af369db4d3833272b8ed443f7fcc2e757a0872eb"}],"source":"https://curl.se/docs/CURL-CVE-2023-27538.json"}}],"schema_version":"1.7.3","credits":[{"name":"Harry Sintonen","type":"FINDER"},{"name":"Daniel Stenberg","type":"REMEDIATION_DEVELOPER"}]}