CVE-2022-32221

When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.
References
Link Resource
http://seclists.org/fulldisclosure/2023/Jan/19 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Jan/20 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2023/05/17/4 Mailing List
https://hackerone.com/reports/1704017 Exploit Issue Tracking Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202212-01 Third Party Advisory
https://security.netapp.com/advisory/ntap-20230110-0006/ Third Party Advisory
https://security.netapp.com/advisory/ntap-20230208-0002/ Third Party Advisory
https://support.apple.com/kb/HT213604 Third Party Advisory
https://support.apple.com/kb/HT213605 Third Party Advisory
https://www.debian.org/security/2023/dsa-5330 Third Party Advisory
http://seclists.org/fulldisclosure/2023/Jan/19 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Jan/20 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2023/05/17/4 Mailing List
https://hackerone.com/reports/1704017 Exploit Issue Tracking Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202212-01 Third Party Advisory
https://security.netapp.com/advisory/ntap-20230110-0006/ Third Party Advisory
https://security.netapp.com/advisory/ntap-20230208-0002/ Third Party Advisory
https://support.apple.com/kb/HT213604 Third Party Advisory
https://support.apple.com/kb/HT213605 Third Party Advisory
https://www.debian.org/security/2023/dsa-5330 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*

Configuration 7 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

Configuration 8 (hide)

cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Configuration 9 (hide)

OR cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*
cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*
cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:05

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2023/Jan/19 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2023/Jan/19 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2023/Jan/20 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2023/Jan/20 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2023/05/17/4 - Mailing List () http://www.openwall.com/lists/oss-security/2023/05/17/4 - Mailing List
References () https://hackerone.com/reports/1704017 - Exploit, Issue Tracking, Third Party Advisory () https://hackerone.com/reports/1704017 - Exploit, Issue Tracking, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/202212-01 - Third Party Advisory () https://security.gentoo.org/glsa/202212-01 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20230110-0006/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20230110-0006/ - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20230208-0002/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20230208-0002/ - Third Party Advisory
References () https://support.apple.com/kb/HT213604 - Third Party Advisory () https://support.apple.com/kb/HT213604 - Third Party Advisory
References () https://support.apple.com/kb/HT213605 - Third Party Advisory () https://support.apple.com/kb/HT213605 - Third Party Advisory
References () https://www.debian.org/security/2023/dsa-5330 - Third Party Advisory () https://www.debian.org/security/2023/dsa-5330 - Third Party Advisory

27 Mar 2024, 15:00

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2023/Jan/19 - Third Party Advisory () http://seclists.org/fulldisclosure/2023/Jan/19 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2023/Jan/20 - Third Party Advisory () http://seclists.org/fulldisclosure/2023/Jan/20 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2023/05/17/4 - () http://www.openwall.com/lists/oss-security/2023/05/17/4 - Mailing List
CPE cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*
cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*
First Time Splunk universal Forwarder
Splunk

17 May 2023, 09:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2023/05/17/4 -

01 Mar 2023, 14:51

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2023/Jan/20 - Third Party Advisory
  • (MLIST) https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html - Mailing List, Third Party Advisory
  • (CONFIRM) https://support.apple.com/kb/HT213605 - Third Party Advisory
  • (DEBIAN) https://www.debian.org/security/2023/dsa-5330 - Third Party Advisory
  • (CONFIRM) https://support.apple.com/kb/HT213604 - Third Party Advisory
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20230208-0002/ - Third Party Advisory
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20230110-0006/ - Third Party Advisory
  • (FULLDISC) http://seclists.org/fulldisclosure/2023/Jan/19 - Third Party Advisory
References (GENTOO) https://security.gentoo.org/glsa/202212-01 - (GENTOO) https://security.gentoo.org/glsa/202212-01 - Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*

19 Dec 2022, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-12-05 22:15

Updated : 2024-11-21 07:05


NVD link : CVE-2022-32221

Mitre link : CVE-2022-32221

CVE.ORG link : CVE-2022-32221


JSON object : View

Products Affected

netapp

  • h500s
  • h300s_firmware
  • h300s
  • h410s
  • h700s
  • clustered_data_ontap
  • h410s_firmware
  • h500s_firmware
  • h700s_firmware

debian

  • debian_linux

apple

  • macos

haxx

  • curl

splunk

  • universal_forwarder
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-668

Exposure of Resource to Wrong Sphere