{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-46218","assignerOrgId":"36234546-b8fa-4601-9d6f-f4e334aa8ea1","state":"PUBLISHED","assignerShortName":"hackerone","dateReserved":"2023-10-19T01:00:12.854Z","datePublished":"2023-12-07T01:10:34.846Z","dateUpdated":"2026-05-12T10:52:38.819Z"},"containers":{"cna":{"descriptions":[{"lang":"en","value":"This flaw allows a malicious HTTP server to set \"super cookies\" in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl's function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain."}],"affected":[{"vendor":"curl","product":"curl","versions":[{"version":"8.4.0","status":"affected","lessThanOrEqual":"8.4.0","versionType":"semver"},{"version":"7.46.0","status":"unaffected","lessThan":"7.46.0","versionType":"semver"}]}],"references":[{"url":"https://hackerone.com/reports/2212193"},{"url":"https://curl.se/docs/CVE-2023-46218.html"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ZX3VW67N4ACRAPMV2QS2LVYGD7H2MVE/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD/"},{"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html"},{"url":"https://www.debian.org/security/2023/dsa-5587"},{"url":"https://security.netapp.com/advisory/ntap-20240125-0007/"}],"providerMetadata":{"orgId":"36234546-b8fa-4601-9d6f-f4e334aa8ea1","shortName":"hackerone","dateUpdated":"2024-01-25T14:06:39.330Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T20:37:40.148Z"},"title":"CVE Program Container","references":[{"url":"https://hackerone.com/reports/2212193","tags":["x_transferred"]},{"url":"https://curl.se/docs/CVE-2023-46218.html","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ZX3VW67N4ACRAPMV2QS2LVYGD7H2MVE/","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD/","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html","tags":["x_transferred"]},{"url":"https://www.debian.org/security/2023/dsa-5587","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20240125-0007/","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-178","lang":"en","description":"CWE-178 Improper Handling of Case Sensitivity"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":6.5,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","integrityImpact":"LOW","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-05-28T16:38:08.000092Z","id":"CVE-2023-46218","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-30T16:20:37.028Z"}},{"x_adpType":"supplier","providerMetadata":{"orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP","dateUpdated":"2026-05-12T10:52:38.819Z"},"affected":[{"vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIPLUS S7-1500 CPU 1518-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM ROX MX5000","versions":[{"status":"affected","version":"0","lessThan":"V2.17.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM ROX MX5000RE","versions":[{"status":"affected","version":"0","lessThan":"V2.17.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM ROX RX1400","versions":[{"status":"affected","version":"0","lessThan":"V2.17.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM ROX RX1500","versions":[{"status":"affected","version":"0","lessThan":"V2.17.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM ROX RX1501","versions":[{"status":"affected","version":"0","lessThan":"V2.17.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM ROX RX1510","versions":[{"status":"affected","version":"0","lessThan":"V2.17.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM ROX RX1511","versions":[{"status":"affected","version":"0","lessThan":"V2.17.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM ROX RX1512","versions":[{"status":"affected","version":"0","lessThan":"V2.17.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM ROX RX1524","versions":[{"status":"affected","version":"0","lessThan":"V2.17.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM ROX RX1536","versions":[{"status":"affected","version":"0","lessThan":"V2.17.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM ROX RX5000","versions":[{"status":"affected","version":"0","lessThan":"V2.17.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SINEC NMS","versions":[{"status":"affected","version":"0","lessThan":"V3.0 SP1","versionType":"custom"}],"defaultStatus":"unknown"}],"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-093430.html"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-331112.html"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-082556.html"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-202008.html"}]}]}}