
Cloud Vulnerability DB
A community-led vulnerabilities database
SafeCurl before version 0.9.2 was identified with a DNS rebinding vulnerability (CVE-2020-36474). The vulnerability was disclosed on August 20, 2021, affecting the SafeCurl library's security mechanisms (CISA Bulletin).
The vulnerability was assigned a CVSS v3.1 base score of 7.5, indicating a medium to high severity level. The vulnerability allowed potential DNS rebinding attacks between when the request URL is checked against the blacklist of IPs and when the curl request is executed (GitHub PR).
The vulnerability could allow attackers to bypass SafeCurl's security controls through DNS rebinding attacks, potentially leading to unauthorized access to internal resources or services that should be protected (CISA Bulletin).
The vulnerability was patched in SafeCurl version 0.9.2. The fix involves implementing DNS pinning after hosts are validated, preventing DNS rebinding attacks by storing resolved domains and setting them in curl (GitHub Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."