CVE-2023-46219
MySQL vulnerability analysis and mitigation

Overview

CVE-2023-46219 is a vulnerability discovered in curl versions 7.84.0 to 8.4.0, reported on November 2, 2023. When saving HSTS (HTTP Strict Transport Security) data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use (Curl Advisory).

Technical details

The vulnerability occurs due to the save function appending a suffix to the file name, creating a temporary file, and then renaming it to the final name. When the filename length was close to the limit of what is allowed on the file system, adding the extension would make it too long and trigger this bug. The vulnerability has been assigned a CVSS v3.1 base score of 5.3 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N and is classified as CWE-311: Missing Encryption of Sensitive Data (NVD, Curl Advisory).

Impact

The successful exploitation of this vulnerability could lead to the addition or modification of data. When triggered, the bug causes the HSTS data file to be cleared, which means subsequent requests would be unaware of the HSTS status they should use, potentially affecting the security of HTTP connections (Curl Advisory).

Mitigation and workarounds

The vulnerability was fixed in curl version 8.5.0, released on December 6, 2023. The fix involves making the temporary filename using a pure random sequence of letters instead of being based on the original filename. Users are recommended to upgrade to version 8.5.0 or later. If upgrading is not possible, users can alternatively choose not to use HSTS (Curl Advisory).

Community reactions

Multiple vendors and distributions have released security advisories and patches for this vulnerability, including Debian, Fedora, and NetApp. Debian released security advisory DSA-5587-1 to address this issue in their distributions (Debian Advisory, Fedora Update).

Additional resources


SourceThis report was generated using AI

Related MySQL vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-53054MEDIUM5.5
  • MySQLMySQL
  • mysql:8.0::mecab-devel
NoYesOct 21, 2025
CVE-2025-53053MEDIUM5.5
  • MySQLMySQL
  • mecab-ipadic-EUCJP
NoYesOct 21, 2025
CVE-2025-53069MEDIUM4.9
  • MySQLMySQL
  • mysql:8.4::rapidjson
NoYesOct 21, 2025
CVE-2025-53067MEDIUM4.9
  • MySQLMySQL
  • cpe:2.3:a:oracle:mysql_server
NoYesOct 21, 2025
CVE-2025-53062MEDIUM4.9
  • MySQLMySQL
  • mysql:8.0::mecab
NoYesOct 21, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management