CVE-2022-42916

In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.
References
Link Resource
http://seclists.org/fulldisclosure/2023/Jan/19 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Jan/20 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/12/21/1 Mailing List Third Party Advisory
https://curl.se/docs/CVE-2022-42916.html Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/ Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202212-01 Third Party Advisory
https://security.netapp.com/advisory/ntap-20221209-0010/ Broken Link
https://support.apple.com/kb/HT213604 Third Party Advisory
https://support.apple.com/kb/HT213605 Third Party Advisory
http://seclists.org/fulldisclosure/2023/Jan/19 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Jan/20 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/12/21/1 Mailing List Third Party Advisory
https://curl.se/docs/CVE-2022-42916.html Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/ Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202212-01 Third Party Advisory
https://security.netapp.com/advisory/ntap-20221209-0010/ Broken Link
https://support.apple.com/kb/HT213604 Third Party Advisory
https://support.apple.com/kb/HT213605 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*
cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*
cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-10-29 02:15

Updated : 2024-11-21 07:25


NVD link : CVE-2022-42916

Mitre link : CVE-2022-42916

CVE.ORG link : CVE-2022-42916


JSON object : View

Products Affected

fedoraproject

  • fedora

splunk

  • universal_forwarder

apple

  • macos

haxx

  • curl
CWE
CWE-319

Cleartext Transmission of Sensitive Information