Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-697h-9h25-w4fm

Опубликовано: 03 фев. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 5.3

Описание

curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (OCSP stapling) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.

curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (OCSP stapling) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.

EPSS

Процентиль: 37%
0.00156
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-295

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 2 лет назад

curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.

CVSS3: 3.8
redhat
около 2 лет назад

curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.

CVSS3: 5.3
nvd
около 2 лет назад

curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.

CVSS3: 5.3
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 5.3
debian
около 2 лет назад

curl inadvertently kept the SSL session ID for connections in its cach ...

EPSS

Процентиль: 37%
0.00156
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-295