CURL-CVE-2022-27780

Source
https://curl.se/docs/CVE-2022-27780.html
Import Source
https://curl.se/docs/CURL-CVE-2022-27780.json
JSON Data
https://api.osv.dev/v1/vulns/CURL-CVE-2022-27780
Aliases
Published
2022-05-11T08:00:00Z
Modified
2024-06-07T13:53:51Z
Summary
percent-encoded path separator in URL host
Details

The curl URL parser wrongly accepts percent-encoded URL separators like '/' when decoding the hostname part of a URL, making it a different URL using the wrong hostname when it is later retrieved.

For example, a URL like http://example.com%2F10.0.0.1/, would be allowed by the parser and get transposed into http://example.com/10.0.0.1/. This flaw can be used to circumvent filters, checks and more.

Database specific
{
    "CWE": {
        "id": "CWE-177",
        "desc": "Improper Handling of URL Encoding"
    },
    "award": {
        "amount": "2400",
        "currency": "USD"
    },
    "URL": "https://curl.se/docs/CVE-2022-27780.json",
    "package": "curl",
    "severity": "Medium",
    "issue": "https://hackerone.com/reports/1553841",
    "www": "https://curl.se/docs/CVE-2022-27780.html",
    "last_affected": "7.83.0"
}
References
Credits
    • Axel Chong - FINDER
    • Daniel Stenberg - REMEDIATION_DEVELOPER

Affected packages

Git / github.com/curl/curl.git

Affected ranges

Type
SEMVER
Events
Introduced
7.80.0
Fixed
7.83.1
Type
GIT
Repo
https://github.com/curl/curl.git
Events

Affected versions

7.*

7.80.0
7.81.0
7.82.0
7.83.0