gsd-2024-0853
Vulnerability from gsd
Modified
2024-01-25 06:03
Details
curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.
Aliases



{
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2024-0853"
      ],
      "details": "curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to\nthe same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.",
      "id": "GSD-2024-0853",
      "modified": "2024-01-25T06:03:20.585772Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "cve@curl.se",
        "ID": "CVE-2024-0853",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "curl",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "\u003c=",
                          "version_name": "8.5.0",
                          "version_value": "8.5.0"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "curl"
            }
          ]
        }
      },
      "credits": [
        {
          "lang": "en",
          "value": "Hiroki Kurosawa"
        },
        {
          "lang": "en",
          "value": "Daniel Stenberg"
        }
      ],
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to\nthe same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "CWE-299 Improper Check for Certificate Revocation "
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://curl.se/docs/CVE-2024-0853.json",
            "refsource": "MISC",
            "url": "https://curl.se/docs/CVE-2024-0853.json"
          },
          {
            "name": "https://curl.se/docs/CVE-2024-0853.html",
            "refsource": "MISC",
            "url": "https://curl.se/docs/CVE-2024-0853.html"
          },
          {
            "name": "https://hackerone.com/reports/2298922",
            "refsource": "MISC",
            "url": "https://hackerone.com/reports/2298922"
          },
          {
            "name": "https://security.netapp.com/advisory/ntap-20240307-0004/",
            "refsource": "MISC",
            "url": "https://security.netapp.com/advisory/ntap-20240307-0004/"
          },
          {
            "name": "https://security.netapp.com/advisory/ntap-20240426-0009/",
            "refsource": "MISC",
            "url": "https://security.netapp.com/advisory/ntap-20240426-0009/"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "cve": {
        "configurations": [
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:haxx:curl:8.5.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B3F10DBE-EB62-4DCA-A46B-651A39A3502B",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          }
        ],
        "descriptions": [
          {
            "lang": "en",
            "value": "curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to\nthe same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check."
          },
          {
            "lang": "es",
            "value": "curl inadvertidamente mantuvo el ID de sesi\u00f3n SSL para las conexiones en su cach\u00e9 incluso cuando fall\u00f3 la prueba de verificaci\u00f3n del estado (*OCSP stapling*). Una transferencia posterior al mismo nombre de host podr\u00eda tener \u00e9xito si la cach\u00e9 de ID de sesi\u00f3n a\u00fan estuviera actualizada, lo que luego omitir\u00eda la verificaci\u00f3n de estado de verificaci\u00f3n."
          }
        ],
        "id": "CVE-2024-0853",
        "lastModified": "2024-04-26T09:15:09.023",
        "metrics": {
          "cvssMetricV31": [
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "NETWORK",
                "availabilityImpact": "NONE",
                "baseScore": 5.3,
                "baseSeverity": "MEDIUM",
                "confidentialityImpact": "NONE",
                "integrityImpact": "LOW",
                "privilegesRequired": "NONE",
                "scope": "UNCHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
                "version": "3.1"
              },
              "exploitabilityScore": 3.9,
              "impactScore": 1.4,
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        },
        "published": "2024-02-03T14:15:50.850",
        "references": [
          {
            "source": "2499f714-1537-4658-8207-48ae4bb9eae9",
            "tags": [
              "Vendor Advisory"
            ],
            "url": "https://curl.se/docs/CVE-2024-0853.html"
          },
          {
            "source": "2499f714-1537-4658-8207-48ae4bb9eae9",
            "tags": [
              "Vendor Advisory"
            ],
            "url": "https://curl.se/docs/CVE-2024-0853.json"
          },
          {
            "source": "2499f714-1537-4658-8207-48ae4bb9eae9",
            "tags": [
              "Exploit",
              "Issue Tracking"
            ],
            "url": "https://hackerone.com/reports/2298922"
          },
          {
            "source": "2499f714-1537-4658-8207-48ae4bb9eae9",
            "url": "https://security.netapp.com/advisory/ntap-20240307-0004/"
          },
          {
            "source": "2499f714-1537-4658-8207-48ae4bb9eae9",
            "url": "https://security.netapp.com/advisory/ntap-20240426-0009/"
          }
        ],
        "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
        "vulnStatus": "Modified",
        "weaknesses": [
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-295"
              }
            ],
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ]
      }
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.