CVE-2024-11053

When asked to both use a `.netrc` file for credentials and to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has an entry that matches the redirect target hostname but the entry either omits just the password or omits both login and password.
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*

History

30 Jul 2025, 17:39

Type Values Removed Values Added
CPE cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*
cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
References () https://curl.se/docs/CVE-2024-11053.html - () https://curl.se/docs/CVE-2024-11053.html - Vendor Advisory
References () https://curl.se/docs/CVE-2024-11053.json - () https://curl.se/docs/CVE-2024-11053.json - Vendor Advisory
References () https://hackerone.com/reports/2829063 - () https://hackerone.com/reports/2829063 - Exploit, Issue Tracking, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2024/12/11/1 - () http://www.openwall.com/lists/oss-security/2024/12/11/1 - Mailing List, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20250124-0012/ - () https://security.netapp.com/advisory/ntap-20250124-0012/ - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20250131-0003/ - () https://security.netapp.com/advisory/ntap-20250131-0003/ - Third Party Advisory
First Time Netapp h410s Firmware
Netapp h300s
Netapp h500s Firmware
Netapp h700s Firmware
Netapp h610c Firmware
Netapp h700s
Netapp h610c
Netapp h615c Firmware
Haxx curl
Netapp ontap Select Deploy Administration Utility
Netapp h410s
Netapp bootstrap Os
Netapp h615c
Netapp h610s Firmware
Haxx
Netapp h300s Firmware
Netapp h500s
Netapp hci Compute Node
Netapp ontap
Netapp
Netapp h610s
CWE NVD-CWE-noinfo

31 Jan 2025, 15:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20250131-0003/ -

24 Jan 2025, 20:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20250124-0012/ -

15 Dec 2024, 17:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.9
v2 : unknown
v3 : 3.4

15 Dec 2024, 16:15

Type Values Removed Values Added
Summary
  • (es) Cuando se le pide que use un archivo `.netrc` para las credenciales y que siga las redirecciones HTTP, curl podría filtrar la contraseña utilizada para el primer host al host al que sigue en determinadas circunstancias. Esta falla solo se manifiesta si el archivo netrc tiene una entrada que coincide con el nombre de host de destino de la redirección, pero la entrada omite solo la contraseña u omite tanto el nombre de usuario como la contraseña.
CVSS v2 : unknown
v3 : 9.1
v2 : unknown
v3 : 5.9

11 Dec 2024, 15:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1

11 Dec 2024, 10:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/12/11/1 -

11 Dec 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-11 08:15

Updated : 2025-07-30 17:39


NVD link : CVE-2024-11053

Mitre link : CVE-2024-11053

CVE.ORG link : CVE-2024-11053


JSON object : View

Products Affected

haxx

  • curl

netapp

  • ontap_select_deploy_administration_utility
  • ontap
  • h700s_firmware
  • h300s
  • h610s
  • h615c
  • h610s_firmware
  • h410s
  • h410s_firmware
  • h610c_firmware
  • h700s
  • h500s
  • h615c_firmware
  • h500s_firmware
  • h610c
  • hci_compute_node
  • h300s_firmware
  • bootstrap_os