When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got *before* the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker's injected data comes from the TLS-protected server.

Project Subscriptions

Vendors Products
Debian Linux Subscribe
Fedoraproject Subscribe
Cloud Backup Subscribe
Clustered Data Ontap Subscribe
H300e Firmware Subscribe
H300s Firmware Subscribe
H410s Firmware Subscribe
H500e Firmware Subscribe
H500s Firmware Subscribe
H700e Firmware Subscribe
H700s Firmware Subscribe
Solidfire Baseboard Management Controller Subscribe
Solidfire Baseboard Management Controller Firmware Subscribe
Commerce Guided Search Subscribe
Communications Cloud Native Core Binding Support Function Subscribe
Communications Cloud Native Core Console Subscribe
Communications Cloud Native Core Network Function Cloud Native Environment Subscribe
Communications Cloud Native Core Network Repository Function Subscribe
Communications Cloud Native Core Network Slice Selection Function Subscribe
Communications Cloud Native Core Security Edge Protection Proxy Subscribe
Communications Cloud Native Core Service Communication Proxy Subscribe
Mysql Server Subscribe
Peoplesoft Enterprise Peopletools Subscribe
Enterprise Linux Subscribe
Rhel Dotnet Subscribe
Rhel Eus Subscribe
Siemens Subscribe
Sinec Infrastructure Network Services Subscribe
Universal Forwarder Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2773-1 curl security update
Debian DLA Debian DLA DLA-3085-1 curl security update
Debian DSA Debian DSA DSA-5197-1 curl security update
Ubuntu USN Ubuntu USN USN-5079-1 curl vulnerabilities
Ubuntu USN Ubuntu USN USN-5079-2 curl vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2024-08-03T18:58:26.408Z

Reserved: 2021-01-06T00:00:00

Link: CVE-2021-22947

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-09-29T20:15:08.253

Modified: 2024-11-21T05:50:59.810

Link: CVE-2021-22947

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-09-15T00:00:00Z

Links: CVE-2021-22947 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses