Lucene search

K
nvd[email protected]NVD:CVE-2022-32221
HistoryDec 05, 2022 - 10:15 p.m.

CVE-2022-32221

2022-12-0522:15:10
CWE-200
CWE-668
web.nvd.nist.gov
libcurl
http
transfers
flaw
misbehave
memory
post
put

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.007 Low

EPSS

Percentile

79.8%

When doing HTTP(S) transfers, libcurl might erroneously use the read callback (CURLOPT_READFUNCTION) to ask for data to send, even when the CURLOPT_POSTFIELDS option has been set, if the same handle previously was used to issue a PUT request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent POST request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.

Affected configurations

NVD
Node
haxxcurlRange<7.86.0
Node
netappclustered_data_ontapMatch-
Node
netapph300s_firmwareMatch-
AND
netapph300sMatch-
Node
netapph500s_firmwareMatch-
AND
netapph500sMatch-
Node
netapph700s_firmwareMatch-
AND
netapph700sMatch-
Node
netapph410s_firmwareMatch-
AND
netapph410sMatch-
Node
debiandebian_linuxMatch10.0
OR
debiandebian_linuxMatch11.0
Node
applemacosRange<12.6.3
Node
splunkuniversal_forwarderRange8.2.0โ€“8.2.12
OR
splunkuniversal_forwarderRange9.0.0โ€“9.0.6
OR
splunkuniversal_forwarderMatch9.1.0

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.007 Low

EPSS

Percentile

79.8%