First published: Mon Dec 12 2022(Updated: )
A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) `.`. Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded.
Credit: CVE-2022-43551 CVE-2022-43552 Mickey Jin @patch1t Xin Huang @11iaxH CVE-2023-0049 CVE-2023-0051 CVE-2023-0054 CVE-2023-0288 CVE-2023-0433 CVE-2023-0512 Gertjan Franken imecKU Leuven hazbinhotel Trend Micro Zero Day InitiativeGeorgy Kucherin @kucher1n KasperskyLeonid Bezvershenko @bzvr_ KasperskyBoris Larin @oct0xor Kaspersky KasperskyValentin Pashkov Kasperskyan anonymous researcher Anonymous Trend Micro Zero Day InitiativeDohyun Lee @l33d0hyun SSD Labscrixer @pwning_me SSD LabsABC Research s.r.o. Mohamed Ghannam @_simo36 Adam M. Brandon Dalton @partyD0lphin Red CanaryChan Shue Long Offensive Security Offensive SecurityCsaba Fitzl @theevilbit Offensive SecurityRıza Sabuncu @rizasabuncu Yiğit Can YILMAZ @yilmazcanyigit JeongOhKyea Tingting Yin Tsinghua UniversityJunoh Lee at Theori Aleksandar Nikolic Cisco TalosMikko Kenttälä ) @Turmio_ SensorFuJoshua Jones Ye Zhang @VAR10CK Baidu SecurityJubaer Alnazi TRS Group of Companiesjzhu Trend Micro Zero Day InitiativeMeysam Firouzi @R00tkitSMM Mbition Mercedesryuzaki Murray Mike Pan ZhenPeng @Peterpan0927 STAR Labs SG PteArsenii Kostromin (0x3c3e) Félix Poulin-Bélanger David Pan Ogea Xinru Chi Pangu LabNed Williamson Google Project ZeroAdam Doupé ASU SEFCOMsqrtpwn an anonymous researcher Red CanaryMilan Tenk F FArthur Valiev FZweig Kunlun LabZhuowei Zhang developStorm Khiem Tran Mickey Jin @patch1t FFRI Security IncKoh M. Nakagawa FFRI Security IncMasahiro Kawada @kawakatz GMO Cybersecurity by IeraeJubaer Alnazi Jabin TRS Group Of Companies Alibaba GroupWenchao Li Alibaba GroupXiaolong Bai Alibaba GroupGuilherme Rambo Best Buddy Apps support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-curl | <0:8.0.1-1.el8 | 0:8.0.1-1.el8 |
redhat/jbcs-httpd24-curl | <0:8.0.1-1.el7 | 0:8.0.1-1.el7 |
redhat/curl | <7.87.0 | 7.87.0 |
Apple macOS | <13.3 | 13.3 |
Curl | >=7.77.0<7.87.0 | |
Fedora | =37 | |
NetApp Active IQ Unified Manager for VMware vSphere | ||
netapp active iq unified manager windows | ||
NetApp OnCommand Insight | ||
NetApp OnCommand Workflow Automation | ||
NetApp SnapCenter | ||
Splunk Universal Forwarder | >=8.2.0<8.2.12 | |
Splunk Universal Forwarder | >=9.0.0<9.0.6 | |
Splunk Universal Forwarder | =9.1.0 | |
IBM Engineering Requirements Management DOORS Web Access | <=9.7.2.7 | |
IBM Rational DOORS Web Access | <=9.7.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The severity of CVE-2022-43551 is high.
The vulnerability in CVE-2022-43551 occurs when curl's HSTS check is bypassed.
The affected software versions are Apple macOS Ventura up to version 13.3, curl up to version 7.87.0, jbcs-httpd24-curl up to version 0:8.0.1-1.el8, and jbcs-httpd24-curl up to version 0:8.0.1-1.el7.
To fix CVE-2022-43551, update curl to version 7.87.0 or higher.
You can find more information about CVE-2022-43551 at the following references: [Link 1](https://curl.se/docs/CVE-2022-43551.html), [Link 2](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2155433), [Link 3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2155434).