CVE-2024-0853

curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.
Configurations

Configuration 1 (hide)

cpe:2.3:a:haxx:curl:8.5.0:*:*:*:*:*:*:*

History

03 May 2024, 13:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240503-0012/ -

26 Apr 2024, 09:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240426-0009/ -

07 Mar 2024, 17:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240307-0004/ -

16 Feb 2024, 15:17

Type Values Removed Values Added
CPE cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:* cpe:2.3:a:haxx:curl:8.5.0:*:*:*:*:*:*:*

13 Feb 2024, 00:41

Type Values Removed Values Added
First Time Haxx curl
Haxx
CPE cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
CWE CWE-295
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
References () https://curl.se/docs/CVE-2024-0853.html - () https://curl.se/docs/CVE-2024-0853.html - Vendor Advisory
References () https://curl.se/docs/CVE-2024-0853.json - () https://curl.se/docs/CVE-2024-0853.json - Vendor Advisory
References () https://hackerone.com/reports/2298922 - () https://hackerone.com/reports/2298922 - Exploit, Issue Tracking

03 Feb 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-03 14:15

Updated : 2024-05-03 13:15


NVD link : CVE-2024-0853

Mitre link : CVE-2024-0853

CVE.ORG link : CVE-2024-0853


JSON object : View

Products Affected

haxx

  • curl
CWE
CWE-295

Improper Certificate Validation