Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-22947

Опубликовано: 29 сент. 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3
CVSS3: 5.9

Описание

When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got before the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker's injected data comes from the TLS-protected server.

РелизСтатусПримечание
bionic

released

7.58.0-2ubuntu3.15
devel

released

7.74.0-1.3ubuntu2
esm-infra-legacy/trusty

not-affected

7.35.0-1ubuntu2.20+esm8
esm-infra/bionic

not-affected

7.58.0-2ubuntu3.15
esm-infra/focal

not-affected

7.68.0-1ubuntu2.7
esm-infra/xenial

released

7.47.0-1ubuntu2.19+esm1
focal

released

7.68.0-1ubuntu2.7
hirsute

released

7.74.0-1ubuntu2.3
impish

released

7.74.0-1.3ubuntu2
jammy

released

7.74.0-1.3ubuntu2

Показывать по

EPSS

Процентиль: 28%
0.00094
Низкий

4.3 Medium

CVSS2

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
redhat
почти 4 года назад

When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got *before* the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker's injected data comes from the TLS-protected server.

CVSS3: 5.9
nvd
больше 3 лет назад

When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got *before* the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker's injected data comes from the TLS-protected server.

msrc
больше 3 лет назад

Open Source Curl Remote Code Execution Vulnerability

CVSS3: 5.9
debian
больше 3 лет назад

When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server t ...

CVSS3: 5.9
github
около 3 лет назад

When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got *before* the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker's injected data comes from the TLS-protected server.

EPSS

Процентиль: 28%
0.00094
Низкий

4.3 Medium

CVSS2

5.9 Medium

CVSS3