[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

251139

 
 

909

 
 

196159

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2022-42916Date: (C)2022-10-31   (M)2024-05-16


In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 7.5CVSS Score :
Exploit Score: 3.9Exploit Score:
Impact Score: 3.6Impact Score:
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector:
Attack Complexity: LOWAccess Complexity:
Privileges Required: NONEAuthentication:
User Interaction: NONEConfidentiality:
Scope: UNCHANGEDIntegrity:
Confidentiality: HIGHAvailability:
Integrity: NONE 
Availability: NONE 
  
Reference:
http://seclists.org/fulldisclosure/2023/Jan/19
http://seclists.org/fulldisclosure/2023/Jan/20
FEDORA-2022-01ffde372c
FEDORA-2022-39688a779d
FEDORA-2022-e9d65906c4
GLSA-202212-01
http://www.openwall.com/lists/oss-security/2022/12/21/1
https://curl.se/docs/CVE-2022-42916.html
https://security.netapp.com/advisory/ntap-20221209-0010/
https://support.apple.com/kb/HT213604
https://support.apple.com/kb/HT213605

CWE    1
CWE-319
OVAL    17
oval:org.secpod.oval:def:2107938
oval:org.secpod.oval:def:707786
oval:org.secpod.oval:def:85075
oval:org.secpod.oval:def:88472
...

© SecPod Technologies