CVE-2024-0853

curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:curl:8.5.0:*:*:*:*:*:*:*

History

26 Apr 2024, 09:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240426-0009/ -

07 Mar 2024, 17:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240307-0004/ -

16 Feb 2024, 15:17

Type Values Removed Values Added
CPE cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:* cpe:2.3:a:haxx:curl:8.5.0:*:*:*:*:*:*:*

13 Feb 2024, 00:41

Type Values Removed Values Added
Summary
  • (es) curl inadvertidamente mantuvo el ID de sesión SSL para las conexiones en su caché incluso cuando falló la prueba de verificación del estado (*OCSP stapling*). Una transferencia posterior al mismo nombre de host podría tener éxito si la caché de ID de sesión aún estuviera actualizada, lo que luego omitiría la verificación de estado de verificación.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
References () https://curl.se/docs/CVE-2024-0853.html - () https://curl.se/docs/CVE-2024-0853.html - Vendor Advisory
References () https://curl.se/docs/CVE-2024-0853.json - () https://curl.se/docs/CVE-2024-0853.json - Vendor Advisory
References () https://hackerone.com/reports/2298922 - () https://hackerone.com/reports/2298922 - Exploit, Issue Tracking
CWE CWE-295
CPE cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
First Time Haxx
Haxx curl

03 Feb 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-03 14:15

Updated : 2024-04-26 09:15


NVD link : CVE-2024-0853

Mitre link : CVE-2024-0853

CVE.ORG link : CVE-2024-0853


JSON object : View

Products Affected

haxx

  • curl
CWE
CWE-295

Improper Certificate Validation