CVE Vulnerabilities

CVE-2022-35252

Published: Sep 23, 2022 | Modified: Mar 27, 2024
CVSS 3.x
3.7
LOW
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
CVSS 2.x
RedHat/V2
RedHat/V3
3.1 LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
Ubuntu
LOW

When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing asister site to deny service to all siblings.

Affected Software

Name Vendor Start Version End Version
Curl Haxx * 7.85.0 (excluding)
JBoss Core Services for RHEL 8 RedHat jbcs-httpd24-curl-0:7.86.0-2.el8jbcs *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-curl-0:7.86.0-2.el7jbcs *
Red Hat Enterprise Linux 8 RedHat curl-0:7.61.1-30.el8 *
Red Hat Enterprise Linux 8.6 Extended Update Support RedHat curl-0:7.61.1-22.el8_6.12 *
Red Hat Enterprise Linux 9 RedHat curl-0:7.76.1-23.el9 *
Red Hat Enterprise Linux 9 RedHat curl-0:7.76.1-23.el9 *
Red Hat JBoss Core Services 1 RedHat curl *
Curl Ubuntu bionic *
Curl Ubuntu devel *
Curl Ubuntu esm-infra/xenial *
Curl Ubuntu focal *
Curl Ubuntu jammy *
Curl Ubuntu kinetic *
Curl Ubuntu trusty *
Curl Ubuntu trusty/esm *
Curl Ubuntu upstream *
Curl Ubuntu xenial *

References