Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-32221

Опубликовано: 26 окт. 2022
Источник: redhat
CVSS3: 4.8
EPSS Низкий

Описание

When doing HTTP(S) transfers, libcurl might erroneously use the read callback (CURLOPT_READFUNCTION) to ask for data to send, even when the CURLOPT_POSTFIELDS option has been set, if the same handle previously was used to issue a PUT request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent POST request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.

A vulnerability was found in curl. The issue occurs when doing HTTP(S) transfers, where curl might erroneously use the read callback (CURLOPT_READFUNCTION) to ask for data to send, even when the CURLOPT_POSTFIELDS option has been set if it previously used the same handle to issue a PUT request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent POST request.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6curlNot affected
Red Hat Enterprise Linux 7curlNot affected
Red Hat Enterprise Linux 8curlNot affected
JBoss Core Services for RHEL 8jbcs-httpd24-curlFixedRHSA-2022:884008.12.2022
JBoss Core Services on RHEL 7jbcs-httpd24-curlFixedRHSA-2022:884008.12.2022
Red Hat Enterprise Linux 9curlFixedRHSA-2023:033323.01.2023
Red Hat Enterprise Linux 9curlFixedRHSA-2023:033323.01.2023
Red Hat Enterprise Linux 9.0 Extended Update SupportcurlFixedRHSA-2023:413918.07.2023
Text-Only JBCScurlFixedRHSA-2022:884108.12.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-440
https://bugzilla.redhat.com/show_bug.cgi?id=2135411curl: POST following PUT confusion

EPSS

Процентиль: 72%
0.00759
Низкий

4.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 2 лет назад

When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.

CVSS3: 9.8
nvd
больше 2 лет назад

When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.

CVSS3: 9.8
msrc
12 месяцев назад

Описание отсутствует

CVSS3: 9.8
debian
больше 2 лет назад

When doing HTTP(S) transfers, libcurl might erroneously use the read c ...

suse-cvrf
больше 2 лет назад

Security update for curl

EPSS

Процентиль: 72%
0.00759
Низкий

4.8 Medium

CVSS3