CVE-2022-32205

A malicious server can serve excessive amounts of `Set-Cookie:` headers in a HTTP response to curl and curl < 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the cookies match, create requests that become larger than the threshold that curl uses internally to avoid sending crazy large requests (1048576 bytes) and instead returns an error.This denial state might remain for as long as the same cookies are kept, match and haven't expired. Due to cookie matching rules, a server on `foo.example.com` can set cookies that also would match for `bar.example.com`, making it it possible for a "sister server" to effectively cause a denial of service for a sibling site on the same second level domain using this method.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
hackeroneCNA
---
---
CVEADP
---
---
CISA-ADPADP
4.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: 35%
VendorProductVersion
haxxcurl
7.71.0 ≤
𝑥
< 7.84.0
debiandebian_linux
11.0
netappclustered_data_ontap
-
netappelement_software
-
netapphci_management_node
-
netappsolidfire
-
netapph300s_firmware
-
netapph500s_firmware
-
netapph700s_firmware
-
netapph410s_firmware
-
applemacos
𝑥
< 13.0
siemensscalance_sc622-2c_firmware
𝑥
< 3.0
siemensscalance_sc626-2c_firmware
𝑥
< 3.0
siemensscalance_sc632-2c_firmware
𝑥
< 3.0
siemensscalance_sc636-2c_firmware
𝑥
< 3.0
siemensscalance_sc642-2c_firmware
𝑥
< 3.0
siemensscalance_sc646-2c_firmware
𝑥
< 3.0
splunkuniversal_forwarder
8.2.0 ≤
𝑥
< 8.2.12
splunkuniversal_forwarder
9.0.0 ≤
𝑥
< 9.0.6
splunkuniversal_forwarder
9.1.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
curl
bullseye
7.74.0-1.3+deb11u13
fixed
buster
not-affected
stretch
not-affected
bullseye (security)
7.74.0-1.3+deb11u11
fixed
bookworm
7.88.1-10+deb12u7
fixed
bookworm (security)
7.88.1-10+deb12u5
fixed
sid
8.10.1-2
fixed
trixie
8.10.1-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
curl
kinetic
Fixed 7.84.0-1
released
jammy
Fixed 7.81.0-1ubuntu1.3
released
impish
Fixed 7.74.0-1.3ubuntu2.3
released
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
not-affected