First published: Wed Jun 01 2022(Updated: )
Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not using one when it built the HSTS cache. Or the otherway around - by having the trailing dot in the HSTS cache and *not* using thetrailing dot in the URL.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Haxx Curl | >=7.82.0<7.83.1 | |
Netapp Hci Bootstrap Os | ||
Netapp Hci Compute Node | ||
NetApp Clustered Data ONTAP | ||
Netapp Solidfire\, Enterprise Sds \& Hci Storage Node | ||
Netapp Solidfire \& Hci Management Node | ||
Netapp H300s Firmware | ||
Netapp H300s | ||
Netapp H500s Firmware | ||
Netapp H500s | ||
Netapp H700s Firmware | ||
Netapp H700s | ||
Netapp H410s Firmware | ||
Netapp H410s | ||
All of | ||
Netapp Hci Bootstrap Os | ||
Netapp Hci Compute Node | ||
All of | ||
Netapp H300s Firmware | ||
Netapp H300s | ||
All of | ||
Netapp H500s Firmware | ||
Netapp H500s | ||
All of | ||
Netapp H700s Firmware | ||
Netapp H700s | ||
All of | ||
Netapp H410s Firmware | ||
Netapp H410s | ||
Splunk Universal Forwarder | >=8.2.0<8.2.12 | |
Splunk Universal Forwarder | >=9.0.0<9.0.6 | |
Splunk Universal Forwarder | =9.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-30115.
The severity of CVE-2022-30115 is medium.
The software affected by CVE-2022-30115 includes Haxx Curl, Netapp Hci Bootstrap Os, Netapp Clustered Data ONTAP, Netapp Solidfire, Enterprise Sds & Hci Storage Node, Netapp Solidfire & Hci Management Node, Apple macOS Ventura, Apple macOS Big Sur, Apple macOS Monterey, Netapp Hci Compute Node.
To fix CVE-2022-30115, it is recommended to update the affected software to a version that has addressed the vulnerability.