CVE-2023-27535
MySQL vulnerability analysis and mitigation

Overview

An authentication bypass vulnerability (CVE-2023-27535) was discovered in libcurl versions prior to 8.0.0. The vulnerability exists in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. The issue was reported by Harry Sintonen on March 5, 2023, and was fixed with the release of curl 8.0.0 on March 20, 2023 (Curl Advisory).

Technical details

The vulnerability stems from libcurl's connection pooling mechanism where previously created connections are kept for reuse if they match the current setup. However, several FTP settings were omitted from the configuration match checks, making them match too easily. The affected settings include CURLOPTFTPACCOUNT, CURLOPTFTPALTERNATIVETOUSER, CURLOPTFTPSSLCCC, and CURLOPTUSE_SSL. The vulnerability has been assigned a CVSS v3.1 base score of 5.9 (Medium) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N (NVD, NetApp Advisory).

Impact

When exploited, this vulnerability could lead to libcurl using incorrect credentials when performing transfers, potentially allowing unauthorized access to sensitive information. The impact is primarily related to confidentiality breaches, as indicated by the CVSS score showing high confidentiality impact but no integrity or availability impact (NetApp Advisory).

Mitigation and workarounds

The primary mitigation is to upgrade curl to version 8.0.0 or later. The fix was implemented in commit 8f4608468b890dc. For systems that cannot be immediately upgraded, there are no known workarounds available (Curl Advisory, Debian Advisory).

Community reactions

Multiple vendors and distributions have released security advisories and patches for this vulnerability, including Debian, Fedora, Gentoo, and NetApp. The vulnerability was assigned a bounty of 2400 USD through the curl bug bounty program (Curl Advisory, Gentoo Advisory).

Additional resources


SourceThis report was generated using AI

Related MySQL vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-53032MEDIUM4.9
  • MySQLMySQL
  • cpe:2.3:a:oracle:mysql_server
NoNoJul 15, 2025
CVE-2025-53023MEDIUM4.9
  • MySQLMySQL
  • mysql-8.0
NoYesJul 15, 2025
CVE-2025-50102MEDIUM4.9
  • MySQLMySQL
  • mysql:8.0::mecab-devel
NoYesJul 15, 2025
CVE-2025-50103MEDIUM4.4
  • MySQLMySQL
  • cpe:2.3:a:oracle:mysql
NoNoJul 15, 2025
CVE-2025-50104LOW2.7
  • MySQLMySQL
  • mysql:8.4::mysql-test
NoYesJul 15, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management