• 公告ID (KylinSec-SA-2022-1587)

摘要:

Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not using one when it built the HSTS cache. Or the otherway around - by having the trailing dot in the HSTS cache and *not* using thetrailing dot in the URL.

安全等级: Low

公告ID: KylinSec-SA-2022-1587

发布日期: 2022年7月5日

关联CVE: CVE-2022-30115  

  • 详细介绍

1. 漏洞描述

   

Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not using one when it built the HSTS cache. Or the otherway around - by having the trailing dot in the HSTS cache and *not* using thetrailing dot in the URL.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2022-30115 KY3.4-4A curl Unaffected
CVE-2022-30115 KY3.4-5 curl Unaffected
CVE-2022-30115 KY3.5.1 curl Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2022-1586 下一篇:KylinSec-SA-2022-1588