CVE Vulnerabilities

CVE-2021-22922

Published: Aug 05, 2021 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.

Affected Software

NameVendorStart VersionEnd Version
CurlHaxx7.27.0 (including)7.78.0 (excluding)
Red Hat Enterprise Linux 8RedHatcurl-0:7.61.1-18.el8_4.1*
Red Hat Enterprise Linux 8.2 Extended Update SupportRedHatcurl-0:7.61.1-12.el8_2.3*
CurlUbuntutrusty*
CurlUbuntuupstream*
CurlUbuntuxenial*

References