libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.
Weaknesses in this category identify some of the underlying problems that commonly allow attackers to manipulate the business logic of an application. Errors in business logic can be devastating to an entire application. They can be difficult to find automatically, since they typically involve legitimate use of the application's functionality. However, many business logic errors can exhibit patterns that are similar to well-understood implementation and design weaknesses.
The product does not validate, or incorrectly validates, a certificate.
Link | Tags |
---|---|
https://hackerone.com/reports/1555796 | third party advisory exploit |
https://security.netapp.com/advisory/ntap-20220609-0009/ | third party advisory |
https://www.debian.org/security/2022/dsa-5197 | mailing list third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html | third party advisory mailing list |
https://security.gentoo.org/glsa/202212-01 | third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2023/03/20/6 | mailing list |