发布时间: 2022年11月4日
修改时间: 2024年10月31日
A vulnerability was found in curl. The issue occurs because curl s HSTS check can be bypassed to trick it to keep using HTTP. Using its HSTS support, it can instruct curl to use HTTPS directly instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. This mechanism can be bypassed if the hostname in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) `.`.
NVD | openEuler | |
---|---|---|
Confidentiality | High | Low |
Attack Vector | Network | Network |
CVSS评分 | 7.5 | 5.3 |
Attack Complexity | Low | Low |
Privileges Required | None | None |
Scope | Unchanged | Unchanged |
Integrity | None | None |
User Interaction | None | None |
Availability | None | None |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2022-2700 | curl security update | 2022年11月4日 |
产品 | 包 | 状态 |
---|---|---|
KY3.5.1 | curl | Fixed |