Expected behavior violation in cURL - CVE-2022-32221

 

Expected behavior violation in cURL - CVE-2022-32221

Published: October 26, 2022


Vulnerability identifier: #VU68746
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2022-32221
CWE-ID: CWE-440
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: curl.haxx.se
Affected software:
cURL

Detailed vulnerability description

The vulnerability allows a remote attacker to force unexpected application behavior.

The vulnerability exists due to a logic error for a reused handle when processing subsequent HTTP PUT and POST requests. The libcurl can erroneously use the read callback (CURLOPT_READFUNCTION) to ask for data to send, even when the CURLOPT_POSTFIELDS option has been set, if the same handle previously was used to issue a PUT request, which used that callback. As a result, such behavior can influence application flow and force unpredictable outcome.


How to mitigate CVE-2022-32221

Install updates from vendor's website.

Sources