CVE-2022-27780 — Improper Handling of URL Encoding (Hex Encoding) in Curl
Severity
7.5HIGHNVD
EPSS
0.2%
top 63.32%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 2
Latest updateJun 14
Description
The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like `http://example.com%2F127.0.0.1/`, would be allowed bythe parser and get transposed into `http://example.com/127.0.0.1/`. This flawcan be used to circumvent filters, checks and more.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages5 packages
🔴Vulnerability Details
4GHSA▶
GHSA-82rv-h33p-2xgc: The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL, making it a *different* URL usin↗2022-06-03
OSV▶
CVE-2022-27780: The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL, making it a *different* URL usin↗2022-06-02
CVEList▶
CVE-2022-27780: The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL, making it a *different* URL usin↗2022-06-01
📋Vendor Advisories
4Microsoft▶
The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL making it a *different* URL usingthe wrong host name when it is later retrieved.For↗2022-06-14
Debian▶
CVE-2022-27780: curl - The curl URL parser wrongly accepts percent-encoded URL separators like '/'when ...↗2022