system/curl: multiple vulnerabilities
Flaw |
From version |
To and including |
CVE |
CWE |
HSTS bypass via trailing dot |
7.82.0 |
7.83.0 |
CVE-2022-30115 |
CWE-319: Cleartext Transmission of Sensitive Information |
TLS and SSH connection too eager reuse |
7.16.1 |
7.83.0 |
CVE-2022-27782 |
CWE-305: Authentication Bypass by Primary Weakness |
CERTINFO never-ending busy-loop |
7.34.0 |
7.83.0 |
CVE-2022-27781 |
CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') |
percent-encoded path separator in URL host |
7.80.0 |
7.83.0 |
CVE-2022-27780 |
CWE-177: Improper Handling of URL Encoding |
cookie for trailing dot TLD |
7.82.0 |
7.83.0 |
CVE-2022-27779 |
CWE-201: Information Exposure Through Sent Data |
curl removes wrong file on error |
7.83.0 |
7.83.0 |
CVE-2022-27778 |
CWE-706: Use of Incorrectly-Resolved Name or Reference |
Auth/cookie leak on redirect |
4.9 |
7.82.0 |
CVE-2022-27776 |
CWE-522: Insufficiently Protected Credentials |
Bad local IPv6 connection reuse |
7.65.0 |
7.82.0 |
CVE-2022-27775 |
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor |
Credential leak on redirect |
4.9 |
7.82.0 |
CVE-2022-27774 |
CWE-522: Insufficiently Protected Credentials |
OAUTH2 bearer bypass in connection re-use |
7.33.0 |
7.82.0 |
CVE-2022-22576 |
CWE-305: Authentication Bypass by Primary Weakness |
Edited by Zach van Rijn