An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
https://hackerone.com/reports/1526328 | issue tracking exploit third party advisory |
https://security.netapp.com/advisory/ntap-20220609-0008/ | third party advisory |
https://www.debian.org/security/2022/dsa-5197 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html | third party advisory mailing list |
https://security.gentoo.org/glsa/202212-01 | third party advisory vendor advisory |