5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
0.002 Low
EPSS
Percentile
56.6%
curl is vulnerable to Improper Certificate Validation. The vulnerability allows matching of wildcard patterns when listed as ‘Subject Alternative Name’ in TLS server certificates and could result in accepting patterns that otherwise should be mismatched.
seclists.org/fulldisclosure/2023/Jul/47
seclists.org/fulldisclosure/2023/Jul/48
seclists.org/fulldisclosure/2023/Jul/52
hackerone.com/reports/1950627
lists.debian.org/debian-lts-announce/2023/10/msg00016.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
lists.fedoraproject.org/archives/list/[email protected]/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
lists.fedoraproject.org/archives/list/[email protected]/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
secdb.alpinelinux.org/edge/main.yaml
secdb.alpinelinux.org/v3.15/main.yaml
secdb.alpinelinux.org/v3.16/main.yaml
secdb.alpinelinux.org/v3.17/main.yaml
secdb.alpinelinux.org/v3.18/main.yaml
security.gentoo.org/glsa/202310-12
security.netapp.com/advisory/ntap-20230609-0009/
support.apple.com/kb/HT213843
support.apple.com/kb/HT213844
support.apple.com/kb/HT213845