CVE-2022-32221
CVSS V2 None
CVSS V3 None
Description
When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.
Overview
- CVE ID
- CVE-2022-32221
- Assigner
- support@hackerone.com
- Vulnerability Status
- Analyzed
- Published Version
- 2022-12-05T22:15:10
- Last Modified Date
- 2023-03-01T14:51:00
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:* | 1 | OR | 7.86.0 |
References
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-32221 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-12-07 18:06:37 | Added to TrackCVE | |||
2022-12-08 17:15:25 | 2022-12-05T22:15:10.343 | 2022-12-05T22:15:10 | CVE Published Date | updated |
2022-12-08 17:15:25 | 2022-12-08T15:29:08 | CVE Modified Date | updated | |
2022-12-08 17:15:25 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2022-12-08 17:15:25 | CWE-668 | Weakness Enumeration | new | |
2022-12-08 17:15:26 | CPE Information | updated | ||
2022-12-19 04:28:24 | 2022-12-19T04:15:13 | CVE Modified Date | updated | |
2022-12-19 04:28:24 | Analyzed | Modified | Vulnerability Status | updated |
2022-12-19 04:28:37 | References | updated | ||
2022-12-19 19:14:10 | Modified | Undergoing Analysis | Vulnerability Status | updated |
2023-01-05 18:19:42 | 2023-01-05T17:29:36 | CVE Modified Date | updated | |
2023-01-05 18:19:42 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-01-05 18:19:42 | Weakness Enumeration | update | ||
2023-01-10 16:17:20 | 2023-01-10T16:15:11 | CVE Modified Date | updated | |
2023-01-10 16:17:20 | Analyzed | Modified | Vulnerability Status | updated |
2023-01-10 16:17:20 | References | updated | ||
2023-01-12 05:15:22 | Modified | Undergoing Analysis | Vulnerability Status | updated |
2023-01-23 21:12:56 | 2023-01-23T20:15:10 | CVE Modified Date | updated | |
2023-01-23 21:12:57 | References | updated | ||
2023-01-26 22:16:24 | 2023-01-26T21:15:41 | CVE Modified Date | updated | |
2023-01-26 22:16:25 | References | updated | ||
2023-01-28 17:14:56 | 2023-01-28T16:15:08 | CVE Modified Date | updated | |
2023-01-28 17:14:57 | References | updated | ||
2023-01-29 00:16:24 | 2023-01-29T00:15:08 | CVE Modified Date | updated | |
2023-01-29 00:16:24 | References | updated | ||
2023-02-08 21:15:25 | 2023-02-08T20:15:11 | CVE Modified Date | updated | |
2023-02-08 21:15:25 | References | updated | ||
2023-03-01 15:14:25 | 2023-03-01T14:51:00 | CVE Modified Date | updated | |
2023-03-01 15:14:25 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |