{"id":"CURL-CVE-2014-8150","summary":"URL request injection","details":"When libcurl sends a request to a server via an HTTP proxy, it copies the\nentire URL into the request and sends if off.\n\nIf the given URL contains line feeds and carriage returns those are sent along\nto the proxy too, which allows the program to for example send a separate HTTP\nrequest injected embedded in the URL.\n\nMany programs allow some kind of external sources to set the URL or provide\npartial pieces for the URL to ask for, and if the URL as received from the\nuser is not stripped good enough this flaw allows malicious users to do\nadditional requests in a way that was not intended, or just to insert request\nheaders into the request that the program did not intend.","aliases":["CVE-2014-8150"],"modified":"2024-06-07T13:53:51Z","published":"2015-01-08T08:00:00Z","database_specific":{"severity":"High","CWE":{"desc":"Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')","id":"CWE-444"},"affects":"both","package":"curl","URL":"https://curl.se/docs/CVE-2014-8150.json","www":"https://curl.se/docs/CVE-2014-8150.html","last_affected":"7.39.0"},"affected":[{"ranges":[{"type":"SEMVER","events":[{"introduced":"6.0"},{"fixed":"7.40.0"}]},{"type":"GIT","repo":"https://github.com/curl/curl.git","events":[{"introduced":"ae1912cb0d494b48d514d937826c9fe83ec96c4d"},{"fixed":"178bd7db34f77e020fb8562890c5625ccbd67093"}]}],"versions":["7.39.0","7.38.0","7.37.1","7.37.0","7.36.0","7.35.0","7.34.0","7.33.0","7.32.0","7.31.0","7.30.0","7.29.0","7.28.1","7.28.0","7.27.0","7.26.0","7.25.0","7.24.0","7.23.1","7.23.0","7.22.0","7.21.7","7.21.6","7.21.5","7.21.4","7.21.3","7.21.2","7.21.1","7.21.0","7.20.1","7.20.0","7.19.7","7.19.6","7.19.5","7.19.4","7.19.3","7.19.2","7.19.1","7.19.0","7.18.2","7.18.1","7.18.0","7.17.1","7.17.0","7.16.4","7.16.3","7.16.2","7.16.1","7.16.0","7.15.5","7.15.4","7.15.3","7.15.2","7.15.1","7.15.0","7.14.1","7.14.0","7.13.2","7.13.1","7.13.0","7.12.3","7.12.2","7.12.1","7.12.0","7.11.2","7.11.1","7.11.0","7.10.8","7.10.7","7.10.6","7.10.5","7.10.4","7.10.3","7.10.2","7.10.1","7.10","7.9.8","7.9.7","7.9.6","7.9.5","7.9.4","7.9.3","7.9.2","7.9.1","7.9","7.8.1","7.8","7.7.3","7.7.2","7.7.1","7.7","7.6.1","7.6","7.5.2","7.5.1","7.5","7.4.2","7.4.1","7.4","7.3","7.2.1","7.2","7.1.1","7.1","6.5.2","6.5.1","6.5","6.4","6.3.1","6.3","6.2","6.1","6.0"],"database_specific":{"source":"https://curl.se/docs/CURL-CVE-2014-8150.json","vanir_signatures":[{"signature_type":"Line","id":"CURL-CVE-2014-8150-1f793b19","digest":{"threshold":0.9,"line_hashes":["319589450036486552730701230983841025880","201075733067261233845207372578983492705","81300746410590519390612847940398268545"]},"deprecated":false,"signature_version":"v1","source":"https://github.com/curl/curl.git/commit/178bd7db34f77e020fb8562890c5625ccbd67093","target":{"file":"lib/url.c"}},{"signature_type":"Function","id":"CURL-CVE-2014-8150-d3d05091","digest":{"function_hash":"56170180944040799913040620451750777493","length":4522},"deprecated":false,"signature_version":"v1","source":"https://github.com/curl/curl.git/commit/178bd7db34f77e020fb8562890c5625ccbd67093","target":{"file":"lib/url.c","function":"parseurlandfillconn"}}]}}],"schema_version":"1.7.3","credits":[{"name":"Andrey Labunets (Facebook)","type":"FINDER"},{"name":"Daniel Stenberg","type":"REMEDIATION_DEVELOPER"}]}