CVE-2021-22924

LOW

libcurl - Info Disclosure

Title source: llm

Description

libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate.

Exploits (1)

nomisec STUB
by Trinadh465 · poc
https://github.com/Trinadh465/external_curl_AOSP10_r33_CVE-2021-22924

References (15)

Scores

CVSS v3 3.7
EPSS 0.0075
EPSS Percentile 72.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Classification

CWE
CWE-20 CWE-706
Status published

Affected Products (38)

haxx/libcurl < 7.77.0
fedoraproject/fedora
debian/debian_linux
debian/debian_linux
debian/debian_linux
netapp/cloud_backup
netapp/clustered_data_ontap
netapp/solidfire_\&_hci_management_node
netapp/solidfire_baseboard_management_controller_firmware
oracle/mysql_server < 5.7.36
oracle/peoplesoft_enterprise_peopletools
oracle/peoplesoft_enterprise_peopletools
oracle/peoplesoft_enterprise_peopletools
siemens/sinec_infrastructure_network_services < 1.0.1.1
siemens/sinema_remote_connect_server < 3.1
... and 23 more

Timeline

Published Aug 05, 2021
Tracked Since Feb 18, 2026