4.3
CVE-2021-22924
- EPSS 0.75%
- Veröffentlicht 05.08.2021 21:15:11
- Zuletzt bearbeitet 09.06.2025 15:15:24
- Quelle support@hackerone.com
- Teams Watchlist Login
- Unerledigt Login
libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Fedoraproject ≫ Fedora Version33
Debian ≫ Debian Linux Version9.0
Debian ≫ Debian Linux Version10.0
Debian ≫ Debian Linux Version11.0
Netapp ≫ Cloud Backup Version-
Netapp ≫ Clustered Data Ontap Version-
Oracle ≫ Mysql Server Version >= 5.7.0 <= 5.7.36
Oracle ≫ Mysql Server Version >= 8.0.0 <= 8.0.26
Oracle ≫ Peoplesoft Enterprise Peopletools Version8.57
Oracle ≫ Peoplesoft Enterprise Peopletools Version8.58
Oracle ≫ Peoplesoft Enterprise Peopletools Version8.59
Siemens ≫ Sinec Infrastructure Network Services Version < 1.0.1.1
Siemens ≫ Sinema Remote Connect Server Version < 3.1
Siemens ≫ Ruggedcomrm 1224 Lte Firmware Version < 7.1
Siemens ≫ Scalance M804pb Firmware Version < 7.1
Siemens ≫ Scalance M812-1 Firmware Version < 7.1
Siemens ≫ Scalance M816-1 Firmware Version < 7.1
Siemens ≫ Scalance M826-2 Firmware Version < 7.1
Siemens ≫ Scalance M874-2 Firmware Version < 7.1
Siemens ≫ Scalance M874-3 Firmware Version < 7.1
Siemens ≫ Scalance M876-3 Firmware Version < 7.1
Siemens ≫ Scalance M876-4 Firmware Version < 7.1
Siemens ≫ Scalance Mum856-1 Firmware Version < 7.1
Siemens ≫ Scalance S615 Firmware Version < 7.1
Siemens ≫ Simatic Cp 1543-1 Firmware Version < 3.0.22
Siemens ≫ Simatic Cp 1545-1 Firmware Version < 1.1
Siemens ≫ Simatic Rtu3010c Firmware Version < 5.0.14
Siemens ≫ Simatic Rtu3030c Firmware Version < 5.0.14
Siemens ≫ Simatic Rtu3031c Firmware Version < 5.0.14
Siemens ≫ Simatic Rtu 3041c Firmware Version < 5.0.14
Siemens ≫ Sinema Remote Connect Version < 3.1
Siemens ≫ Siplus Net Cp 1543-1 Firmware Version < 3.0.22
Splunk ≫ Universal Forwarder Version >= 8.2.0 < 8.2.12
Splunk ≫ Universal Forwarder Version >= 9.0.0 < 9.0.6
Splunk ≫ Universal Forwarder Version9.1.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.75% | 0.722 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 3.7 | 2.2 | 1.4 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
|
nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:P/I:N/A:N
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 3.7 | 2.2 | 1.4 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
CWE-706 Use of Incorrectly-Resolved Name or Reference
The product uses a name or reference to access a resource, but the name/reference resolves to a resource that is outside of the intended control sphere.