Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-22947

Опубликовано: 29 сент. 2021
Источник: ubuntu
Приоритет: medium
CVSS2: 4.3
CVSS3: 5.9

Описание

When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got before the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker's injected data comes from the TLS-protected server.

РелизСтатусПримечание
bionic

released

7.58.0-2ubuntu3.15
devel

released

7.74.0-1.3ubuntu2
esm-infra-legacy/trusty

released

7.35.0-1ubuntu2.20+esm8
esm-infra/bionic

released

7.58.0-2ubuntu3.15
esm-infra/focal

released

7.68.0-1ubuntu2.7
esm-infra/xenial

released

7.47.0-1ubuntu2.19+esm1
focal

released

7.68.0-1ubuntu2.7
hirsute

released

7.74.0-1ubuntu2.3
impish

released

7.74.0-1.3ubuntu2
jammy

released

7.74.0-1.3ubuntu2

Показывать по

4.3 Medium

CVSS2

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
redhat
около 4 лет назад

When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got *before* the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker's injected data comes from the TLS-protected server.

CVSS3: 5.9
nvd
около 4 лет назад

When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got *before* the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker's injected data comes from the TLS-protected server.

msrc
почти 4 года назад

Open Source Curl Remote Code Execution Vulnerability

CVSS3: 5.9
debian
около 4 лет назад

When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server t ...

CVSS3: 5.9
github
больше 3 лет назад

When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got *before* the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker's injected data comes from the TLS-protected server.

4.3 Medium

CVSS2

5.9 Medium

CVSS3