Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    cURL vulnerability 2023

    Scheduled Pinned Locked Moved Off-Topic & Non-Support Discussion
    7 Posts 4 Posters 963 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • fireodoF
      fireodo
      last edited by

      Hi,

      maybe you already know but if not, there is probably a severe vulnerability in cURL. Details here:

      cURL-CVE-2023-38545

      Nice Sunday,
      fireodo

      Kettop Mi4300YL CPU: i5-4300Y @ 1.60GHz RAM: 8GB Ethernet Ports: 4
      SSD: SanDisk pSSD-S2 16GB (ZFS) WiFi: WLE200NX
      pfsense 2.8.0 CE
      Packages: Apcupsd, Cron, Iftop, Iperf, LCDproc, Nmap, pfBlockerNG, RRD_Summary, Shellcmd, Snort, Speedtest, System_Patches.

      JonathanLeeJ 1 Reply Last reply Reply Quote 1
      • OdetteO
        Odette
        last edited by

        By the way, on curl.se site, reporting detailed information about the vulnerability, the recommendations to solve the vulnerability are:
        A - Upgrade curl to version 8.4.0
        B - Apply the patch to your local version
        C - Do not use CURLPROXY_SOCKS5_HOSTNAME proxies with curl
        D - Do not set a proxy environment variable to socks5h://

        It seems that points C and D are the default settings in pfSense, thereby the vulnerability may not affect pfSense.

        Could somebody confirm or negate, please?

        jimpJ 1 Reply Last reply Reply Quote 1
        • jimpJ
          jimp Rebel Alliance Developer Netgate @Odette
          last edited by

          @Odette said in cURL vulnerability 2023:

          By the way, on curl.se site, reporting detailed information about the vulnerability, the recommendations to solve the vulnerability are:
          A - Upgrade curl to version 8.4.0

          This is the version in 23.09

          B - Apply the patch to your local version

          Not relevant

          C - Do not use CURLPROXY_SOCKS5_HOSTNAME proxies with curl
          D - Do not set a proxy environment variable to socks5h://

          It seems that points C and D are the default settings in pfSense, thereby the vulnerability may not affect pfSense.

          Could somebody confirm or negate, please?

          You are correct, nothing on pfSense (Plus or CE) sets any sort of SOCKS5 value with cURL. We do set a proxy configuration when one is configured for upstream (System > Advanced, Misc tab) but it is not SOCKS5.

          Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

          Need help fast? Netgate Global Support!

          Do not Chat/PM for help!

          OdetteO 1 Reply Last reply Reply Quote 3
          • OdetteO
            Odette @jimp
            last edited by

            Thank you @jimp for your appreciate and risolutive replay.
            Just a question: what does

            This is the version in 23.09

            mean?

            Here is the output of curl -V on a standard 2.7.0 release of psSense CE:

            2023.11.06_curl_1.png

            The output shows curl version is 8.1.0.

            Just my curiosity

            1 Reply Last reply Reply Quote 0
            • jimpJ
              jimp Rebel Alliance Developer Netgate
              last edited by

              2.7.0 is older, it wouldn't have it there. But as the other points mentioned, it's not a concern.

              [23.09-RELEASE][root@ruby.lab.jimp.pw]/root: cat /etc/version
              23.09-RELEASE
              [23.09-RELEASE][root@ruby.lab.jimp.pw]/root: curl -V
              curl 8.4.0 (amd64-portbld-freebsd14.0) libcurl/8.4.0 OpenSSL/3.0.12 zlib/1.2.13 libpsl/0.21.2 (+libidn2/2.3.4) libssh2/1.11.0 nghttp2/1.55.1
              Release-Date: 2023-10-11
              Protocols: dict file ftp ftps gopher gophers http https imap imaps pop3 pop3s rtsp scp sftp smtp smtps telnet tftp
              Features: alt-svc AsynchDNS GSS-API HSTS HTTP2 HTTPS-proxy IPv6 Kerberos Largefile libz NTLM NTLM_WB PSL SPNEGO SSL threadsafe TLS-SRP UnixSockets
              

              There is a CE 2.7.1 release coming that has cURL 8.4.0 as well, there should be RC images to test soon (maybe even today).

              Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

              Need help fast? Netgate Global Support!

              Do not Chat/PM for help!

              1 Reply Last reply Reply Quote 2
              • OdetteO
                Odette
                last edited by

                Confirmed: fixed in 2.7.1

                [2.7.1-RELEASE][root@xxx.yyy.zzz]/root: cat /etc/version
                2.7.1-RELEASE
                [2.7.1-RELEASE][root@xxx.yyy.zzz]/root: curl -V
                curl 8.4.0 (amd64-portbld-freebsd14.0) libcurl/8.4.0 OpenSSL/3.0.12 zlib/1.2.13 libpsl/0.21.2 (+libidn2/2.3.4) libssh2/1.11.0 nghttp2/1.57.0
                Release-Date: 2023-10-11
                Protocols: dict file ftp ftps gopher gophers http https imap imaps pop3 pop3s rtsp scp sftp smtp smtps telnet tftp
                Features: alt-svc AsynchDNS GSS-API HSTS HTTP2 HTTPS-proxy IPv6 Kerberos Largefile libz NTLM NTLM_WB PSL SPNEGO SSL threadsafe TLS-SRP UnixSockets
                
                
                1 Reply Last reply Reply Quote 2
                • JonathanLeeJ
                  JonathanLee @fireodo
                  last edited by

                  @fireodo my son's Nintendo switch was running cURL all day on the network, I had to move it to it's own lan away from everything

                  Make sure to upvote

                  1 Reply Last reply Reply Quote 1
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.