Description
A malicious server can serve excessive amounts of `Set-Cookie:` headers in a HTTP response to curl and curl < 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the cookies match, create requests that become larger than the threshold that curl uses internally to avoid sending crazy large requests (1048576 bytes) and instead returns an error.This denial state might remain for as long as the same cookies are kept, match and haven't expired. Due to cookie matching rules, a server on `foo.example.com` can set cookies that also would match for `bar.example.com`, making it it possible for a "sister server" to effectively cause a denial of service for a sibling site on the same second level domain using this method.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5197-1 | curl security update |
Ubuntu USN |
USN-5495-1 | curl vulnerabilities |
References
History
Mon, 05 May 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Apple
Subscribe
Macos
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Haxx
Subscribe
Curl
Subscribe
Netapp
Subscribe
Clustered Data Ontap
Subscribe
Element Software
Subscribe
H300s
Subscribe
H300s Firmware
Subscribe
H410s
Subscribe
H410s Firmware
Subscribe
H500s
Subscribe
H500s Firmware
Subscribe
H700s
Subscribe
H700s Firmware
Subscribe
Hci Management Node
Subscribe
Solidfire
Subscribe
Siemens
Subscribe
Scalance Sc622-2c
Subscribe
Scalance Sc622-2c Firmware
Subscribe
Scalance Sc626-2c
Subscribe
Scalance Sc626-2c Firmware
Subscribe
Scalance Sc632-2c
Subscribe
Scalance Sc632-2c Firmware
Subscribe
Scalance Sc636-2c
Subscribe
Scalance Sc636-2c Firmware
Subscribe
Scalance Sc642-2c
Subscribe
Scalance Sc642-2c Firmware
Subscribe
Scalance Sc646-2c
Subscribe
Scalance Sc646-2c Firmware
Subscribe
Splunk
Subscribe
Universal Forwarder
Subscribe
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2025-05-05T16:17:03.151Z
Reserved: 2022-06-01T00:00:00.000Z
Link: CVE-2022-32205
Updated: 2024-08-03T07:32:56.071Z
Status : Modified
Published: 2022-07-07T13:15:08.277
Modified: 2025-05-05T17:18:12.680
Link: CVE-2022-32205
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN