• CVE-2022-43551

发布时间: 2023年1月6日

修改时间: 2024年10月31日

概要

A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) `.`. Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded.

CVSS v3 指标

NVD openEuler
Confidentiality High High
Attack Vector Network Network
CVSS评分 7.5 7.5
Attack Complexity Low Low
Privileges Required None None
Scope Unchanged Unchanged
Integrity None None
User Interaction None None
Availability None None

安全公告

公告名 概要 发布时间
KylinSec-SA-2023-1014 curl security update 2023年1月6日
KylinSec-SA-2023-1831 mysql security update 2023年11月17日
KylinSec-SA-2023-2312 mysql security update 2023年11月17日
KylinSec-SA-2024-4166 mysql security update 2024年12月9日

影响产品

产品 状态
KY3.4-5A curl Fixed
KY3.5.2 curl Fixed
KY3.5.1 curl Fixed