CVE-2022-32221

When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.
References
Link Resource
http://seclists.org/fulldisclosure/2023/Jan/19 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Jan/20 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2023/05/17/4 Mailing List
https://hackerone.com/reports/1704017 Exploit Issue Tracking Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202212-01 Third Party Advisory
https://security.netapp.com/advisory/ntap-20230110-0006/ Third Party Advisory
https://security.netapp.com/advisory/ntap-20230208-0002/ Third Party Advisory
https://support.apple.com/kb/HT213604 Third Party Advisory
https://support.apple.com/kb/HT213605 Third Party Advisory
https://www.debian.org/security/2023/dsa-5330 Third Party Advisory
http://seclists.org/fulldisclosure/2023/Jan/19 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Jan/20 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2023/05/17/4 Mailing List
https://hackerone.com/reports/1704017 Exploit Issue Tracking Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202212-01 Third Party Advisory
https://security.netapp.com/advisory/ntap-20230110-0006/ Third Party Advisory
https://security.netapp.com/advisory/ntap-20230208-0002/ Third Party Advisory
https://support.apple.com/kb/HT213604 Third Party Advisory
https://support.apple.com/kb/HT213605 Third Party Advisory
https://www.debian.org/security/2023/dsa-5330 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*

Configuration 7 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

Configuration 8 (hide)

cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Configuration 9 (hide)

OR cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*
cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*
cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-12-05 22:15

Updated : 2024-11-21 07:05


NVD link : CVE-2022-32221

Mitre link : CVE-2022-32221

CVE.ORG link : CVE-2022-32221


JSON object : View

Products Affected

netapp

  • h300s_firmware
  • h700s_firmware
  • h410s_firmware
  • clustered_data_ontap
  • h300s
  • h500s
  • h410s
  • h500s_firmware
  • h700s

debian

  • debian_linux

splunk

  • universal_forwarder

apple

  • macos

haxx

  • curl
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-668

Exposure of Resource to Wrong Sphere