secure keyword for https://targethttp://target (same
hostname, but using clear text HTTP) using the same cookie setpath=\"/\",).
Since this site is not secure, the cookie should just be ignored.The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.
The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.
| Software | From | Fixed in |
|---|---|---|
| haxx / curl | 8.13.0 | 8.16.0 |
| debian / debian_linux | 11.0 | 11.0.x |