Уязвимость обхода проверки HSTS в curl через использование IDN символов в имени хоста
Описание
В curl обнаружена уязвимость, позволяющая обойти механизм проверки HSTS. HSTS в curl предназначен для принудительного использования HTTPS, даже если в URL указан HTTP. Однако этот механизм мог быть обойдён, если в имени хоста использовались символы IDN, которые заменялись на ASCII-эквиваленты при конверсии IDN. Например, использование символа UTF-8 U+3002
(IDEOGRAPHIC FULL STOP) вместо обычной ASCII точки U+002E
(.).
Затронутые версии ПО
- Ранние версии начиная с 7.77.0, выпущенные с 26 мая 2021 года, и вплоть до версии 7.86.0
Тип уязвимости
HSTS Bypass (обход механизма принудительного использования HTTPS)
Ссылки
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Vendor Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Broken Link
- Third Party Advisory
- Third Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Vendor Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Broken Link
Уязвимые конфигурации
Одно из
Одно из
Одно из
EPSS
7.5 High
CVSS3
Дефекты
Связанные уязвимости
In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.
In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.
In curl before 7.86.0, the HSTS check could be bypassed to trick it in ...
In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.
EPSS
7.5 High
CVSS3