CVE-2021-22924
LOWlibcurl - Info Disclosure
Title source: llmDescription
libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate.
Exploits (1)
nomisec
STUB
by Trinadh465 · poc
https://github.com/Trinadh465/external_curl_AOSP10_r33_CVE-2021-22924
References (15)
Scores
CVSS v3
3.7
EPSS
0.0075
EPSS Percentile
72.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Classification
CWE
CWE-20
CWE-706
Status
published
Affected Products (38)
haxx/libcurl
< 7.77.0
fedoraproject/fedora
debian/debian_linux
debian/debian_linux
debian/debian_linux
netapp/cloud_backup
netapp/clustered_data_ontap
netapp/solidfire_\&_hci_management_node
netapp/solidfire_baseboard_management_controller_firmware
oracle/mysql_server
< 5.7.36
oracle/peoplesoft_enterprise_peopletools
oracle/peoplesoft_enterprise_peopletools
oracle/peoplesoft_enterprise_peopletools
siemens/sinec_infrastructure_network_services
< 1.0.1.1
siemens/sinema_remote_connect_server
< 3.1
... and 23 more
Timeline
Published
Aug 05, 2021
Tracked Since
Feb 18, 2026