SNOW-590858: curlcurl-7_68_0: 16 vulnerabilities (highest severity is: 7.5) - autoclosed
Closed this issue · 1 comments
Vulnerable Library - curlcurl-7_68_0
A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features
Library home page: https://github.com/bagder/curl.git
Vulnerable Source Files (4)
/deps/curl-7.68.0/lib/connect.c
/deps/curl-7.68.0/lib/connect.c
/deps/curl-7.68.0/lib/multi.c
/deps/curl-7.68.0/lib/easy.c
Vulnerabilities
CVE | Severity | CVSS | Dependency | Type | Fixed in | Remediation Available |
---|---|---|---|---|---|---|
CVE-2020-8231 | High | 7.5 | curlcurl-7_68_0 | Direct | curl-7_72_0 | ❌ |
CVE-2020-8285 | High | 7.5 | curlcurl-7_68_0 | Direct | 7.74.0 | ❌ |
CVE-2021-22926 | High | 7.5 | curlcurl-7_68_0 | Direct | curl-7_78_0 | ❌ |
CVE-2022-27782 | High | 7.5 | curlcurl-7_68_0 | Direct | curl-7_83_1 | ❌ |
CVE-2021-22922 | Medium | 6.5 | curlcurl-7_68_0 | Direct | curl-7_78_0 | ❌ |
CVE-2022-27774 | Medium | 5.5 | curlcurl-7_68_0 | Direct | curl-7_83_0 | ❌ |
CVE-2021-22876 | Medium | 5.3 | curlcurl-7_68_0 | Direct | curl-7_76_0 | ❌ |
CVE-2021-22923 | Medium | 5.3 | curlcurl-7_68_0 | Direct | curl-7_78_0 | ❌ |
CVE-2021-22925 | Medium | 5.3 | curlcurl-7_68_0 | Direct | curl-7_78_0 | ❌ |
CVE-2022-22576 | Medium | 4.6 | curlcurl-7_68_0 | Direct | curl-7_83_0 | ❌ |
CVE-2022-27776 | Medium | 4.3 | curlcurl-7_68_0 | Direct | curl-7_83_0 | ❌ |
CVE-2020-8284 | Low | 3.7 | curlcurl-7_68_0 | Direct | 7.74.0 | ❌ |
CVE-2021-22924 | Low | 3.7 | curlcurl-7_68_0 | Direct | curl-7_78_0 | ❌ |
CVE-2021-22890 | Low | 3.7 | curlcurl-7_68_0 | Direct | curl-7_76_0 | ❌ |
CVE-2022-27781 | Low | 3.7 | curlcurl-7_68_0 | Direct | curl-7_83_1 | ❌ |
CVE-2022-27775 | Low | 2.6 | curlcurl-7_68_0 | Direct | curl-7_83_0 | ❌ |
Details
CVE-2020-8231
Vulnerable Library - curlcurl-7_68_0
A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features
Library home page: https://github.com/bagder/curl.git
Found in base branch: master
Vulnerable Source Files (4)
/deps/curl-7.68.0/lib/connect.c
/deps/curl-7.68.0/lib/connect.c
/deps/curl-7.68.0/lib/multi.c
/deps/curl-7.68.0/lib/easy.c
Vulnerability Details
Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.
Publish Date: 2020-12-14
URL: CVE-2020-8231
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://github.com/curl/curl/tree/curl-7_72_0
Release Date: 2020-12-14
Fix Resolution: curl-7_72_0
CVE-2020-8285
Vulnerable Library - curlcurl-7_68_0
A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features
Library home page: https://github.com/bagder/curl.git
Found in base branch: master
Vulnerable Source Files (2)
/deps/curl-7.68.0/lib/ftp.c
/deps/curl-7.68.0/lib/ftp.c
Vulnerability Details
curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.
Publish Date: 2020-12-14
URL: CVE-2020-8285
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://curl.se/docs/CVE-2020-8285.html
Release Date: 2020-12-14
Fix Resolution: 7.74.0
CVE-2021-22926
Vulnerable Library - curlcurl-7_68_0
A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features
Library home page: https://github.com/bagder/curl.git
Found in base branch: master
Vulnerable Source Files (2)
/deps/curl-7.68.0/lib/vtls/sectransp.c
/deps/curl-7.68.0/lib/vtls/sectransp.c
Vulnerability Details
libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the CURLOPT_SSLCERT
option (--cert
with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like /tmp
), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake.
Publish Date: 2021-08-05
URL: CVE-2021-22926
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://curl.se/docs/CVE-2021-22926.html
Release Date: 2021-08-05
Fix Resolution: curl-7_78_0
CVE-2022-27782
Vulnerable Library - curlcurl-7_68_0
A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features
Library home page: https://github.com/bagder/curl.git
Found in base branch: master
Vulnerable Source Files (4)
/deps/curl-7.68.0/lib/vtls/vtls.c
/deps/curl-7.68.0/lib/vtls/mbedtls.c
/deps/curl-7.68.0/lib/vtls/gtls.c
/deps/curl-7.68.0/lib/vtls/nss.c
Vulnerability Details
CVE-2022-27782 curl: TLS and SSH connection too eager reuse
Publish Date: 2022-03-24
URL: CVE-2022-27782
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://curl.se/docs/CVE-2022-27782.html
Release Date: 2022-03-24
Fix Resolution: curl-7_83_1
CVE-2021-22922
Vulnerable Library - curlcurl-7_68_0
A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features
Library home page: https://github.com/bagder/curl.git
Found in base branch: master
Vulnerable Source Files (4)
/deps/curl-7.68.0/src/tool_operate.c
/deps/curl-7.68.0/src/tool_getparam.c
/deps/curl-7.68.0/src/tool_cfgable.h
/deps/curl-7.68.0/src/tool_sdecls.h
Vulnerability Details
When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.
Publish Date: 2021-08-05
URL: CVE-2021-22922
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://curl.se/docs/CVE-2021-22922.html
Release Date: 2021-08-05
Fix Resolution: curl-7_78_0
CVE-2022-27774
Vulnerable Library - curlcurl-7_68_0
A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features
Library home page: https://github.com/bagder/curl.git
Found in base branch: master
Vulnerable Source Files (2)
/deps/curl-7.68.0/lib/vtls/gtls.c
/deps/curl-7.68.0/lib/vtls/gtls.c
Vulnerability Details
curl follows HTTP(S) redirects when asked to. curl also supports
authentication. When a user and password are provided for a URL with a given hostname, curl makes an effort to not pass on those credentials to other hosts in redirects unless given permission with a special option.
This "same host check" has been flawed all since it was introduced. It does not work on cross protocol redirects and it does not consider different port numbers to be separate hosts. This leads to curl leaking credentials to other servers when it follows redirects from auth protected HTTP(S) URLs to other
protocols and port numbers.
By default, curl only allows redirects to HTTP(S) and FTP(S), but can be asked to allow redirects to all protocols curl supports
Affected versions: curl 4.9 to and including 7.82.0
Publish Date: 2022-03-24
URL: CVE-2022-27774
CVSS 3 Score Details (5.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://hackerone.com/reports/1543773
Release Date: 2022-03-24
Fix Resolution: curl-7_83_0
CVE-2021-22876
Vulnerable Library - curlcurl-7_68_0
A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features
Library home page: https://github.com/bagder/curl.git
Found in base branch: master
Vulnerable Source Files (2)
/deps/curl-7.68.0/lib/transfer.c
/deps/curl-7.68.0/lib/transfer.c
Vulnerability Details
curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.
Publish Date: 2021-04-01
URL: CVE-2021-22876
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://curl.se/docs/CVE-2021-22876.html
Release Date: 2021-04-01
Fix Resolution: curl-7_76_0
CVE-2021-22923
Vulnerable Library - curlcurl-7_68_0
A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features
Library home page: https://github.com/bagder/curl.git
Found in base branch: master
Vulnerable Source Files (4)
/deps/curl-7.68.0/src/tool_operate.c
/deps/curl-7.68.0/src/tool_getparam.c
/deps/curl-7.68.0/src/tool_cfgable.h
/deps/curl-7.68.0/src/tool_sdecls.h
Vulnerability Details
When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user's expectations and intentions and without telling the user it happened.
Publish Date: 2021-08-05
URL: CVE-2021-22923
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://curl.se/docs/CVE-2021-22923.html
Release Date: 2021-08-05
Fix Resolution: curl-7_78_0
CVE-2021-22925
Vulnerable Library - curlcurl-7_68_0
A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features
Library home page: https://github.com/bagder/curl.git
Found in base branch: master
Vulnerable Source Files (2)
/deps/curl-7.68.0/lib/telnet.c
/deps/curl-7.68.0/lib/telnet.c
Vulnerability Details
curl supports the -t
command line option, known as CURLOPT_TELNETOPTIONS
in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending NEW_ENV
variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.
Publish Date: 2021-08-05
URL: CVE-2021-22925
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://curl.se/docs/CVE-2021-22925.html
Release Date: 2021-08-05
Fix Resolution: curl-7_78_0
CVE-2022-22576
Vulnerable Library - curlcurl-7_68_0
A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features
Library home page: https://github.com/bagder/curl.git
Found in base branch: master
Vulnerable Source Files (1)
/deps/curl-7.68.0/lib/strcase.c
Vulnerability Details
ibcurl might reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).
libcurl maintains a pool of live connections after a transfer has completed (sometimes called the connection cache). This pool of connections is then gone through when a new transfer is requested and if there is a live connection available that can be reused, it is preferred instead of creating a new one.
Due to this security vulnerability, a connection that is successfully created and authenticated with a user name + OAUTH2 bearer could subsequently be erroneously reused even for user + [other OAUTH2 bearer], even though that might not even be a valid bearer. This could lead to an authentication bypass, either by mistake or by a malicious actor.
Affected versions: curl 7.33.0 to and including 7.82.0
Publish Date: 2022-01-05
URL: CVE-2022-22576
CVSS 3 Score Details (4.6)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://curl.se/docs/CVE-2022-22576.html
Release Date: 2022-01-05
Fix Resolution: curl-7_83_0
CVE-2022-27776
Vulnerable Library - curlcurl-7_68_0
A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features
Library home page: https://github.com/bagder/curl.git
Found in base branch: master
Vulnerable Source Files (2)
/deps/curl-7.68.0/lib/http.c
/deps/curl-7.68.0/lib/http.c
Vulnerability Details
curl might leak authentication or cookie header data on HTTP redirects to the same host but another port number.
When asked to send custom headers or cookies in its HTTP requests, curl sends that set of headers only to the host which name is used in the initial URL, so that redirects to other hosts will make curl send the data to those. However,
due to a flawed check, curl wrongly also sends that same set of headers to the hosts that are identical to the first one but use a different port number or URL scheme. Contrary to expectation and intention.
Sending the same set of headers to a server on a different port number is in particular a problem for applications that pass on custom Authorization: or Cookie: headers, as those header often contains privacy sensitive information or data that could allow others to impersonate the curl-using client's request.
curl and libcurl have options that allow users to opt out from this check, but that is not set by default.r.
Affected versions: curl 4.9 to and including 7.82.0
Publish Date: 2022-03-24
URL: CVE-2022-27776
CVSS 3 Score Details (4.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://hackerone.com/reports/1547048
Release Date: 2022-03-24
Fix Resolution: curl-7_83_0
CVE-2020-8284
Vulnerable Library - curlcurl-7_68_0
A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features
Library home page: https://github.com/bagder/curl.git
Found in base branch: master
Vulnerable Source Files (2)
/deps/curl-7.68.0/src/tool_cfgable.c
/deps/curl-7.68.0/src/tool_cfgable.c
Vulnerability Details
A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.
Publish Date: 2020-12-14
URL: CVE-2020-8284
CVSS 3 Score Details (3.7)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://curl.se/docs/CVE-2020-8284.html
Release Date: 2020-12-14
Fix Resolution: 7.74.0
CVE-2021-22924
Vulnerable Library - curlcurl-7_68_0
A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features
Library home page: https://github.com/bagder/curl.git
Found in base branch: master
Vulnerable Source Files (4)
/deps/curl-7.68.0/lib/vtls/vtls.c
/deps/curl-7.68.0/lib/vtls/nss.c
/deps/curl-7.68.0/lib/vtls/gtls.c
/deps/curl-7.68.0/lib/vtls/nss.c
Vulnerability Details
libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths case insensitively,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate.
Publish Date: 2021-08-05
URL: CVE-2021-22924
CVSS 3 Score Details (3.7)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://curl.se/docs/CVE-2021-22924.html
Release Date: 2021-08-05
Fix Resolution: curl-7_78_0
CVE-2021-22890
Vulnerable Library - curlcurl-7_68_0
A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features
Library home page: https://github.com/bagder/curl.git
Found in base branch: master
Vulnerable Source Files (4)
/deps/curl-7.68.0/lib/vtls/vtls.c
/deps/curl-7.68.0/lib/vtls/bearssl.c
/deps/curl-7.68.0/lib/vtls/wolfssl.c
/deps/curl-7.68.0/lib/vtls/sectransp.c
Vulnerability Details
curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly "short-cut" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.
Publish Date: 2021-04-01
URL: CVE-2021-22890
CVSS 3 Score Details (3.7)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://curl.se/docs/CVE-2021-22890.html
Release Date: 2021-04-01
Fix Resolution: curl-7_76_0
CVE-2022-27781
Vulnerable Library - curlcurl-7_68_0
A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features
Library home page: https://github.com/bagder/curl.git
Found in base branch: master
Vulnerable Source Files (2)
/deps/curl-7.68.0/lib/vtls/nss.c
/deps/curl-7.68.0/lib/vtls/nss.c
Vulnerability Details
CVE-2022-27781 curl: CERTINFO never-ending busy-loop
Publish Date: 2022-03-24
URL: CVE-2022-27781
CVSS 3 Score Details (3.7)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: https://curl.se/docs/CVE-2022-27781.html
Release Date: 2022-03-24
Fix Resolution: curl-7_83_1
CVE-2022-27775
Vulnerable Library - curlcurl-7_68_0
A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features
Library home page: https://github.com/bagder/curl.git
Found in base branch: master
Vulnerable Source Files (2)
/deps/curl-7.68.0/lib/conncache.c
/deps/curl-7.68.0/lib/conncache.c
Vulnerability Details
ibcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup.
Due to errors in the logic, the config matching function did not take the IPv6 address zone id into account which could lead to libcurl reusing wrong connection when one transfer uses a zone id and subsequent transfer uses another.
Affected versions: curl 7.65.0 to and including 7.82.0
Publish Date: 2022-03-24
URL: CVE-2022-27775
CVSS 3 Score Details (2.6)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://hackerone.com/reports/1546268
Release Date: 2022-03-24
Fix Resolution: curl-7_83_0
✔️ This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.