Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-43551
HistoryDec 21, 2022 - 12:00 a.m.

CVE-2022-43551

2022-12-2100:00:00
ubuntu.com
ubuntu.com
64

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

41.7%

A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to
trick it to keep using HTTP. Using its HSTS support, curl can be instructed
to use HTTPS instead of using an insecure clear-text HTTP step even when
HTTP is provided in the URL. However, the HSTS mechanism could be bypassed
if the host name in the given URL first uses IDN characters that get
replaced to ASCII counterparts as part of the IDN conversion. Like using
the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common
ASCII full stop (U+002E) .. Then in a subsequent request, it does not
detect the HSTS state and makes a clear text transfer. Because it would
store the info IDN encoded but look for it IDN decoded.

Bugs

Notes

Author Note
mdeslaur Affected versions: curl 7.77.0 to and including 7.86.0
OSVersionArchitecturePackageVersionFilename
ubuntu22.04noarchcurl< 7.81.0-1ubuntu1.7UNKNOWN
ubuntu22.10noarchcurl< 7.85.0-1ubuntu0.2UNKNOWN
ubuntu23.04noarchcurl< 7.87.0-1UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

41.7%