Analyse ausstehendCVE-2026-7168

CVE-2026-7168: Proxy Header Leak in libcurl

Plattform

c

Komponente

curl

Behoben in

8.19.1

CVE-2026-7168 affects versions 8.12.0 through 8.19.0 of libcurl. This vulnerability arises when libcurl incorrectly forwards the Proxy-Authorization header intended for one proxy server to a different proxy server during a transfer sequence. This can lead to unintended exposure of authentication credentials and potential unauthorized access to resources behind the second proxy.

Auswirkungen und Angriffsszenarien

The primary impact of CVE-2026-7168 is the potential leakage of proxy authentication credentials. An attacker who can control the HTTP proxy chain could craft a malicious request sequence that exploits this flaw. First, a connection is established to proxyA using Digest authentication. Then, a subsequent connection is attempted to proxyB. Due to the incorrect header forwarding, the Proxy-Authorization header intended for proxyA is inadvertently sent to proxyB. If proxyB relies on this header for authentication, an attacker could potentially bypass authentication and gain unauthorized access to resources protected by proxyB. The blast radius is limited to systems using libcurl with the vulnerable proxy configuration and relying on Digest authentication. This vulnerability doesn't inherently lead to remote code execution, but it can facilitate privilege escalation or data exfiltration if the compromised proxy has access to sensitive data.

Ausnutzungskontext

CVE-2026-7168 was published on May 13, 2026. Its CVSS severity is pending evaluation. There are currently no publicly known proof-of-concept exploits. It is not listed on KEV or EPSS, suggesting a low to medium probability of exploitation. Active campaigns are not currently known, but the vulnerability's nature makes it a potential target for opportunistic attackers.

Bedrohungsanalyse

Exploit-Status

Proof of ConceptUnbekannt
CISA KEVNO

EPSS

0.03% (10% Perzentil)

Betroffene Software

Komponentecurl
Herstellercurl
Mindestversion8.12.0
Höchstversion8.19.0
Behoben in8.19.1

Schwachstellen-Klassifikation (CWE)

Zeitleiste

  1. Reserviert
  2. Veröffentlicht
  3. EPSS aktualisiert

Mitigation und Workarounds

The recommended mitigation for CVE-2026-7168 is to upgrade to libcurl version 8.19.1 or later, which contains the fix. If upgrading is not immediately feasible, consider implementing temporary workarounds. One approach is to disable Digest authentication for proxy servers where possible. Alternatively, configure your proxy servers to ignore unexpected or malformed Proxy-Authorization headers. WAF rules can be implemented to inspect HTTP requests for suspicious header forwarding patterns. Carefully review proxy configurations to ensure that authentication headers are handled correctly. After upgrading, confirm the fix by performing a test transfer sequence through multiple proxies with Digest authentication to verify that the Proxy-Authorization header is not being incorrectly forwarded.

So behebenwird übersetzt…

Actualice a la versión 8.19.1 o posterior de libcurl para evitar la fuga de estado de autenticación Digest. Esta vulnerabilidad permite que la información de autenticación de un proxy se transmita incorrectamente a otro proxy, lo que podría comprometer la seguridad de las comunicaciones.

Häufig gestellte Fragen

What is CVE-2026-7168 — Proxy Header Leak in libcurl?

CVE-2026-7168 is a vulnerability in libcurl versions 8.12.0–8.19.0 where the Proxy-Authorization header is incorrectly forwarded to a different proxy, potentially exposing authentication credentials.

Am I affected by CVE-2026-7168 in libcurl?

You are affected if you are using libcurl versions 8.12.0 through 8.19.0 and your application utilizes HTTP proxies with Digest authentication.

How do I fix CVE-2026-7168 in libcurl?

Upgrade to libcurl version 8.19.1 or later to resolve the vulnerability. Consider temporary workarounds like disabling Digest authentication or configuring proxy servers to ignore unexpected headers.

Is CVE-2026-7168 being actively exploited?

Currently, there are no publicly known active exploitation campaigns or proof-of-concept exploits for CVE-2026-7168.

Where can I find the official libcurl advisory for CVE-2026-7168?

Refer to the libcurl project's website and security announcements for the official advisory regarding CVE-2026-7168: https://curl.se/security/

Ist dein Projekt betroffen?

Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.

liveKostenloser Scan

Jetzt testen — kein Konto

Laden Sie ein Manifest hoch (composer.lock, package-lock.json, WordPress Plugin-Liste…) oder fügen Sie Ihre Komponentenliste ein. Sie erhalten sofort einen Schwachstellenbericht. Das Hochladen einer Datei ist nur der Anfang: Mit einem Konto erhalten Sie kontinuierliche Überwachung, Slack/email-Benachrichtigungen, Multi-Projekt- und White-Label-Berichte.

Manueller ScanSlack/E-Mail-AlertsKontinuierliche ÜberwachungWhite-Label-Berichte

Abhängigkeitsdatei hier ablegen

composer.lock, package-lock.json, requirements.txt, Gemfile.lock, pubspec.lock, Dockerfile...