An issue was discovered in Qt before 5.15.14, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. Qt Network incorrectly parses the strict-transport-security (HSTS) header, allowing unencrypted connections to be established, even when explicitly prohibited by the server. This happens if the case used for this header does not exactly match.
[
{
"id": "CVE-2023-32762-1d1a0a9d",
"deprecated": false,
"digest": {
"line_hashes": [
"198455504285215276206513920714838399588",
"280746894577215508959761652343184383218",
"248521215612386692078688414216867720462",
"66058527147137772403119859541830059642"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "src/network/access/qhsts.cpp"
},
"signature_type": "Line",
"source": "https://github.com/qt/qtbase/commit/1b736a815be0222f4b24289cf17575fc15707305"
},
{
"id": "CVE-2023-32762-65be528c",
"deprecated": false,
"digest": {
"length": 3714.0,
"function_hash": "202253668995713526950139037894621624785"
},
"signature_version": "v1",
"target": {
"function": "tst_QHsts::testSTSHeaderParser",
"file": "tests/auto/network/access/hsts/tst_qhsts.cpp"
},
"signature_type": "Function",
"source": "https://github.com/qt/qtbase/commit/1b736a815be0222f4b24289cf17575fc15707305"
}
]