A flaw was found in all versions up to and including 7.65.1_1 of the official curl-for-windows binaries built and hosted by the curl project. A non-privileged user or program can put code and a config file in a known non-privileged path that will make curl automatically run the code on invocation. Upstream patch: https://github.com/curl/curl-for-win/commit/51b658a76594942cf1d6f227d8fc4732bb8ec277 References: https://curl.haxx.se/docs/CVE-2019-5443.html
Acknowledgments: Name: the Curl project Upstream: Rich Mirch
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-5443