Description


A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations **withoutTLS** contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.

References


http://seclists.org/fulldisclosure/2022/Mar/29

Mailing ListThird Party Advisory


https://hackerone.com/reports/1334111

ExploitIssue TrackingPatchThird Party Advisory








https://support.apple.com/kb/HT213183

Release NotesThird Party Advisory






http://seclists.org/fulldisclosure/2022/Mar/29

Mailing ListThird Party Advisory


https://hackerone.com/reports/1334111

ExploitIssue TrackingPatchThird Party Advisory








https://support.apple.com/kb/HT213183

Release NotesThird Party Advisory





Weaknesses



CWE-325


CWE-319

CVSS impact metrics


CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.5 · High

Information


Source identifier

[email protected]

Vulnerability status

Modified

Published

2021-09-29T18:15:08.187Z

4 years ago

Last modified

2024-11-21T04:50:59.587Z

1 year ago