{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-22925","assignerOrgId":"36234546-b8fa-4601-9d6f-f4e334aa8ea1","assignerShortName":"hackerone","dateUpdated":"2026-04-16T16:36:24.090Z","dateReserved":"2021-01-06T00:00:00.000Z","datePublished":"2021-08-05T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"36234546-b8fa-4601-9d6f-f4e334aa8ea1","shortName":"hackerone","dateUpdated":"2022-12-19T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application."}],"affected":[{"vendor":"n/a","product":"https://github.com/curl/curl","versions":[{"version":"curl 7.7 to and including 7.77.0","status":"affected"}]}],"references":[{"url":"https://hackerone.com/reports/1223882"},{"name":"FEDORA-2021-5d21b90a30","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/"},{"name":"20210921 APPLE-SA-2021-09-20-8 Additional information for APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2021/Sep/40"},{"name":"20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2021/Sep/39"},{"url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"url":"https://security.netapp.com/advisory/ntap-20210902-0003/"},{"url":"https://support.apple.com/kb/HT212805"},{"url":"https://support.apple.com/kb/HT212804"},{"url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf"},{"name":"GLSA-202212-01","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202212-01"}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"Information Disclosure (CWE-200)","cweId":"CWE-200"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T18:58:26.060Z"},"title":"CVE Program Container","references":[{"url":"https://hackerone.com/reports/1223882","tags":["x_transferred"]},{"name":"FEDORA-2021-5d21b90a30","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/"},{"name":"20210921 APPLE-SA-2021-09-20-8 Additional information for APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2021/Sep/40"},{"name":"20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2021/Sep/39"},{"url":"https://www.oracle.com/security-alerts/cpuoct2021.html","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20210902-0003/","tags":["x_transferred"]},{"url":"https://support.apple.com/kb/HT212805","tags":["x_transferred"]},{"url":"https://support.apple.com/kb/HT212804","tags":["x_transferred"]},{"url":"https://www.oracle.com/security-alerts/cpujan2022.html","tags":["x_transferred"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf","tags":["x_transferred"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf","tags":["x_transferred"]},{"name":"GLSA-202212-01","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202212-01"}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.3,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"timestamp":"2026-04-16T16:36:17.820310Z","id":"CVE-2021-22925","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-16T16:36:24.090Z"}}]}}