Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-28321

Опубликовано: 17 мая 2023
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with xn-- and should not be allowed to pattern match, but the wildcard check in curl could still check for x*, which would match even though the IDN name most likely contained nothing even resembling an x.

A flaw was found in the Curl package. An incorrect International Domain Name (IDN) wildcard match may lead to improper certificate validation.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
.NET Core 3.1 on Red Hat Enterprise Linuxrh-dotnet31-curlOut of support scope
Red Hat Enterprise Linux 6curlOut of support scope
Red Hat Enterprise Linux 7curlWill not fix
JBoss Core Services for RHEL 8jbcs-httpd24-curlFixedRHSA-2023:462915.08.2023
JBoss Core Services on RHEL 7jbcs-httpd24-curlFixedRHSA-2023:462915.08.2023
Red Hat Enterprise Linux 8curlFixedRHSA-2023:452308.08.2023
Red Hat Enterprise Linux 8.6 Extended Update SupportcurlFixedRHSA-2023:629202.11.2023
Red Hat Enterprise Linux 9curlFixedRHSA-2023:435401.08.2023
Red Hat Enterprise Linux 9curlFixedRHSA-2023:435401.08.2023
Red Hat Enterprise Linux 9.0 Extended Update SupportcurlFixedRHSA-2023:559810.10.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-295
https://bugzilla.redhat.com/show_bug.cgi?id=2196786curl: IDN wildcard match may lead to Improper Cerificate Validation

EPSS

Процентиль: 52%
0.00293
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
ubuntu
около 2 лет назад

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
nvd
около 2 лет назад

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
msrc
около 2 лет назад

Описание отсутствует

CVSS3: 5.9
debian
около 2 лет назад

An improper certificate validation vulnerability exists in curl <v8.1. ...

CVSS3: 5.9
github
около 2 лет назад

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

EPSS

Процентиль: 52%
0.00293
Низкий

5.9 Medium

CVSS3