CVE-2022-35252
moderate-risk
Published 2022-09-23
When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service to all siblings.
Do I need to act?
-
0.29% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.7/10
Low
NETWORK
/ HIGH complexity
Affected Products (14)
References (16)
Mailing List
http://seclists.org/fulldisclosure/2023/Jan/20
Mailing List
http://seclists.org/fulldisclosure/2023/Jan/21
Third Party Advisory
https://security.gentoo.org/glsa/202212-01
Third Party Advisory
https://security.netapp.com/advisory/ntap-20220930-0005/
Third Party Advisory
https://support.apple.com/kb/HT213603
Third Party Advisory
https://support.apple.com/kb/HT213604
Mailing List
http://seclists.org/fulldisclosure/2023/Jan/20
Mailing List
http://seclists.org/fulldisclosure/2023/Jan/21
Third Party Advisory
https://security.gentoo.org/glsa/202212-01
Third Party Advisory
https://security.netapp.com/advisory/ntap-20220930-0005/
Third Party Advisory
https://support.apple.com/kb/HT213603
Third Party Advisory
https://support.apple.com/kb/HT213604
32
/ 100
moderate-risk
Severity
13/34 · Low
Exploitability
1/34 · Minimal
Exposure
18/34 · Moderate