TROYANOSYVIRUS
Back to CVEs

CVE-2022-30115

MEDIUM
4.3

Description

Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not using one when it built the HSTS cache. Or the otherway around - by having the trailing dot in the HSTS cache and *not* using thetrailing dot in the URL.

CVE Details

CVSS v3.1 Score4.3
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published6/2/2022
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0

Affected Products

haxx:curlnetapp:clustered_data_ontapnetapp:h300snetapp:h300s_firmwarenetapp:h410snetapp:h410s_firmwarenetapp:h500snetapp:h500s_firmwarenetapp:h700snetapp:h700s_firmwarenetapp:hci_bootstrap_osnetapp:hci_compute_nodenetapp:solidfire\,_enterprise_sds_\&_hci_storage_nodenetapp:solidfire_\&_hci_management_nodesplunk:universal_forwarder

Weaknesses (CWE)

CWE-325CWE-319

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.