This flaw allows a malicious HTTP server to set "super cookies" in curl
36827
27 January 2026
27 January 2026
CLOSED
LOW
6.5 Medium - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2023-46218
|
Brocade Security Advisory ID |
BSA-2026-2480 |
|
Component |
HTTP |
|
|
|
Summary
This flaw allows a malicious HTTP server to set "super cookies" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl's function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.
Products Affected
- Brocade ASCG before 3.1.0
Products Not Affected
- Brocade Fabric OS versions before 10.0.0
[VEX Justification: Vulnerable_code_cannot_be_controlled_by_adversary] - Brocade SANnav
[VEX Justification: Vulnerable_code_cannot_be_controlled_by_adversary]
Solution
- While Brocade Fabric OS is not affected, a security update has been provided in Brocade Fabric OS 10.0.0
- Security update provided in Brocade ASCG 3.1.0
Revision History
|
Version |
Change |
Date |
|
1.0 |
Initial Publication |
January 27, 2026 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.