cve-2024-0853
Vulnerability from cvelistv5
Published
2024-02-03 13:35
Modified
2024-08-01 18:18
Severity
Summary
OCSP verification bypass with TLS session reuse
Impacted products
VendorProduct
curlcurl
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T18:18:19.012Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "json",
            "tags": [
              "x_transferred"
            ],
            "url": "https://curl.se/docs/CVE-2024-0853.json"
          },
          {
            "name": "www",
            "tags": [
              "x_transferred"
            ],
            "url": "https://curl.se/docs/CVE-2024-0853.html"
          },
          {
            "name": "issue",
            "tags": [
              "x_transferred"
            ],
            "url": "https://hackerone.com/reports/2298922"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20240307-0004/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20240426-0009/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20240503-0012/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "curl",
          "vendor": "curl",
          "versions": [
            {
              "lessThanOrEqual": "8.5.0",
              "status": "affected",
              "version": "8.5.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Hiroki Kurosawa"
        },
        {
          "lang": "en",
          "type": "remediation developer",
          "value": "Daniel Stenberg"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to\nthe same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "CWE-299 Improper Check for Certificate Revocation ",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-03T13:35:25.863Z",
        "orgId": "2499f714-1537-4658-8207-48ae4bb9eae9",
        "shortName": "curl"
      },
      "references": [
        {
          "name": "json",
          "url": "https://curl.se/docs/CVE-2024-0853.json"
        },
        {
          "name": "www",
          "url": "https://curl.se/docs/CVE-2024-0853.html"
        },
        {
          "name": "issue",
          "url": "https://hackerone.com/reports/2298922"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20240307-0004/"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20240426-0009/"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20240503-0012/"
        }
      ],
      "title": "OCSP verification bypass with TLS session reuse"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2499f714-1537-4658-8207-48ae4bb9eae9",
    "assignerShortName": "curl",
    "cveId": "CVE-2024-0853",
    "datePublished": "2024-02-03T13:35:25.863Z",
    "dateReserved": "2024-01-24T08:42:02.618Z",
    "dateUpdated": "2024-08-01T18:18:19.012Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-0853\",\"sourceIdentifier\":\"2499f714-1537-4658-8207-48ae4bb9eae9\",\"published\":\"2024-02-03T14:15:50.850\",\"lastModified\":\"2024-05-03T13:15:21.320\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to\\nthe same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.\"},{\"lang\":\"es\",\"value\":\"curl inadvertidamente mantuvo el ID de sesi\u00f3n SSL para las conexiones en su cach\u00e9 incluso cuando fall\u00f3 la prueba de verificaci\u00f3n del estado (*OCSP stapling*). Una transferencia posterior al mismo nombre de host podr\u00eda tener \u00e9xito si la cach\u00e9 de ID de sesi\u00f3n a\u00fan estuviera actualizada, lo que luego omitir\u00eda la verificaci\u00f3n de estado de verificaci\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-295\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haxx:curl:8.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3F10DBE-EB62-4DCA-A46B-651A39A3502B\"}]}]}],\"references\":[{\"url\":\"https://curl.se/docs/CVE-2024-0853.html\",\"source\":\"2499f714-1537-4658-8207-48ae4bb9eae9\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://curl.se/docs/CVE-2024-0853.json\",\"source\":\"2499f714-1537-4658-8207-48ae4bb9eae9\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://hackerone.com/reports/2298922\",\"source\":\"2499f714-1537-4658-8207-48ae4bb9eae9\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240307-0004/\",\"source\":\"2499f714-1537-4658-8207-48ae4bb9eae9\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20240426-0009/\",\"source\":\"2499f714-1537-4658-8207-48ae4bb9eae9\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20240503-0012/\",\"source\":\"2499f714-1537-4658-8207-48ae4bb9eae9\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...