curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to
the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.
References
Configurations
History
21 Nov 2024, 08:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://curl.se/docs/CVE-2024-0853.html - Vendor Advisory | |
References | () https://curl.se/docs/CVE-2024-0853.json - Vendor Advisory | |
References | () https://hackerone.com/reports/2298922 - Exploit, Issue Tracking | |
References | () https://security.netapp.com/advisory/ntap-20240307-0004/ - | |
References | () https://security.netapp.com/advisory/ntap-20240426-0009/ - | |
References | () https://security.netapp.com/advisory/ntap-20240503-0012/ - |
03 May 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Apr 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Mar 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Feb 2024, 15:17
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:haxx:curl:8.5.0:*:*:*:*:*:*:* |
13 Feb 2024, 00:41
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-295 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
CPE | cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:* | |
First Time |
Haxx curl
Haxx |
|
References | () https://curl.se/docs/CVE-2024-0853.html - Vendor Advisory | |
References | () https://curl.se/docs/CVE-2024-0853.json - Vendor Advisory | |
References | () https://hackerone.com/reports/2298922 - Exploit, Issue Tracking |
03 Feb 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-03 14:15
Updated : 2024-11-21 08:47
NVD link : CVE-2024-0853
Mitre link : CVE-2024-0853
CVE.ORG link : CVE-2024-0853
JSON object : View
Products Affected
haxx
- curl
CWE
CWE-295
Improper Certificate Validation