The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like `http://example.com%2F127.0.0.1/`, would be allowed bythe parser and get transposed into `http://example.com/127.0.0.1/`. This flawcan be used to circumvent filters, checks and more.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Haxx
Subscribe
|
Curl
Subscribe
|
|
Netapp
Subscribe
|
Clustered Data Ontap
Subscribe
H300s
Subscribe
H300s Firmware
Subscribe
H410s
Subscribe
H410s Firmware
Subscribe
H500s
Subscribe
H500s Firmware
Subscribe
H700s
Subscribe
H700s Firmware
Subscribe
Hci Bootstrap Os
Subscribe
Hci Compute Node
Subscribe
Solidfire\, Enterprise Sds \& Hci Storage Node
Subscribe
Solidfire \& Hci Management Node
Subscribe
|
|
Splunk
Subscribe
|
Universal Forwarder
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-5412-1 | curl vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-08-07T19:09:34.290Z
Reserved: 2022-03-23T00:00:00
Link: CVE-2022-27780
Updated: 2024-08-03T05:32:59.992Z
Status : Modified
Published: 2022-06-02T14:15:44.267
Modified: 2024-11-21T06:56:10.427
Link: CVE-2022-27780
OpenCVE Enrichment
No data.
Ubuntu USN