CVE-2022-27779 — Sensitive Info Insertion into Sent Data in Curl
Severity
5.3MEDIUMNVD
EPSS
0.3%
top 49.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 2
Latest updateJun 14
Description
libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost name is provided with a trailing dot.curl can be told to receive and send cookies. curl's "cookie engine" can bebuilt with or without [Public Suffix List](https://publicsuffix.org/)awareness. If PSL support not provided, a more rudimentary check exists to atleast prevent cookies from being set on TLDs. This check was broken if thehost name in the URL uses a trailing dot.This can allow arbitrary sites to set cookies …
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4
Affected Packages4 packages
🔴Vulnerability Details
3GHSA▶
GHSA-r5c3-3mf2-x8c7: libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost name is provided with a trailing dot↗2022-06-03
OSV▶
CVE-2022-27779: libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost name is provided with a trailing dot↗2022-06-02
CVEList▶
CVE-2022-27779: libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost name is provided with a trailing dot↗2022-06-01
📋Vendor Advisories
3Microsoft▶
libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost name is provided with a trailing dot.curl can be told to receive and send cookies. curl's "cookie engine" can bebuilt w↗2022-06-14
Debian▶
CVE-2022-27779: curl - libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost...↗2022