CWE
668 200 440
Advisory Published
CVE Published
CVE Published
Updated

CVE-2022-32221: Infoleak

First published: Mon Oct 17 2022(Updated: )

A vulnerability was found in curl. The issue occurs when doing HTTP(S) transfers, where curl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set if it previously used the same handle to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request.

Credit: support@hackerone.com CVE-2022-42915 CVE-2022-42916 CVE-2022-32221 CVE-2022-35260 CVE-2022-42915 CVE-2022-42916 CVE-2022-32221 CVE-2022-35260 support@hackerone.com

Affected SoftwareAffected VersionHow to fix
redhat/jbcs-httpd24-curl<0:7.86.0-2.el8
0:7.86.0-2.el8
redhat/jbcs-httpd24-curl<0:7.86.0-2.el7
0:7.86.0-2.el7
redhat/curl<0:7.76.1-19.el9_1.1
0:7.76.1-19.el9_1.1
redhat/curl<0:7.76.1-14.el9_0.6
0:7.76.1-14.el9_0.6
debian/curl<=7.64.0-4+deb10u2
7.64.0-4+deb10u7
7.74.0-1.3+deb11u9
7.74.0-1.3+deb11u10
7.88.1-10+deb12u3
7.88.1-10+deb12u4
8.4.0-2
Apple macOS Ventura<13.2
13.2
redhat/curl<7.86.0
7.86.0
redhat/libcurl<7.86.0
7.86.0
Apple macOS Monterey<12.6.3
12.6.3
Haxx Curl<7.86.0
NetApp Clustered Data ONTAP
All of
Netapp H300s Firmware
Netapp H300s
All of
Netapp H500s Firmware
Netapp H500s
All of
Netapp H700s Firmware
Netapp H700s
All of
Netapp H410s Firmware
Netapp H410s
Debian Debian Linux=10.0
Debian Debian Linux=11.0
Apple macOS<12.6.3
Splunk Universal Forwarder>=8.2.0<8.2.12
Splunk Universal Forwarder>=9.0.0<9.0.6
Splunk Universal Forwarder=9.1.0
Netapp H300s Firmware
Netapp H300s
Netapp H500s Firmware
Netapp H500s
Netapp H700s Firmware
Netapp H700s
Netapp H410s Firmware
Netapp H410s

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2022-32221?

    CVE-2022-32221 is a vulnerability in libcurl that can be exploited when using the read callback incorrectly.

  • How does CVE-2022-32221 affect macOS Monterey?

    macOS Monterey version 12.6.3 is affected by CVE-2022-32221. Updating to version 12.6.3 remedies the vulnerability.

  • Which version of jbcs-httpd24-curl is affected by CVE-2022-32221 on Red Hat?

    Versions up to and excluding 0:7.86.0-2.el8 and 0:7.86.0-2.el7 of jbcs-httpd24-curl on Red Hat are affected by CVE-2022-32221.

  • How severe is CVE-2022-32221?

    CVE-2022-32221 has a severity level of medium.

  • Where can I find more information about CVE-2022-32221?

    You can find more information about CVE-2022-32221 at the following links: [Apple Support](https://support.apple.com/en-us/HT213604), [CVE](https://www.cve.org/CVERecord?id=CVE-2022-32221), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2022-32221), [curl.se](https://curl.se/docs/CVE-2022-32221.html), and [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=2135411).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203