vulnerability
Red Hat: CVE-2022-22576: CVE-2022-22576 curl: OAUTH2 bearer bypass in connection re-use (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:L/Au:S/C:P/I:P/A:N) | 2022-05-26 | 2022-07-05 | 2024-11-27 |
Severity
6
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:N)
Published
2022-05-26
Added
2022-07-05
Modified
2024-11-27
Description
An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).
Solution(s)
redhat-upgrade-curlredhat-upgrade-curl-debuginforedhat-upgrade-curl-debugsourceredhat-upgrade-curl-minimalredhat-upgrade-curl-minimal-debuginforedhat-upgrade-libcurlredhat-upgrade-libcurl-debuginforedhat-upgrade-libcurl-develredhat-upgrade-libcurl-minimalredhat-upgrade-libcurl-minimal-debuginfo

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.