Lucene search

K
hackeroneMonneratH1:1334111
HistorySep 09, 2021 - 12:34 a.m.

curl: CVE-2021-22946: Protocol downgrade required TLS bypassed

2021-09-0900:34:37
monnerat
hackerone.com
62
cve-2021-22946
imap
pop3
ftp
tls bypass
mitm
network sniffing

EPSS

0.003

Percentile

69.8%

Summary:

In imap and pop3, --ssl-reqd is silently ignored if the capability command failed.
In ftp, a non-standard 230 response (preauthentication?) in the greeter message forces curl to continue unencrypted, even if TLS has been required.

Steps To Reproduce:

Use a parameterizable test server to fail capability command for imap (CAPABILITY reply: A001 BAD Not implemented) and pop3 (CAPA reply: -ERR Not implemented) and to send response code 230 in FTP server greeting message.

  1. curl --ssl-reqd imap://server/โ€ฆ
  2. curl --ssl-reqd pop3://server/โ€ฆ
  3. curl --ssl-reqd --ftp-ssl-control ftp://server/โ€ฆ

These 3 commands are successsful, but network sniffing shows that TLS is never negotiated.

Impact

A MitM can silently deny mandatory TLS negotiation and thus sniff and/or update unencrypted transferred data.