Description
When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service to all siblings.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3288-1 | curl security update |
Ubuntu USN |
USN-5587-1 | curl vulnerability |
References
History
Mon, 05 May 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Apple
Subscribe
Macos
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Haxx
Subscribe
Curl
Subscribe
Netapp
Subscribe
Bootstrap Os
Subscribe
Clustered Data Ontap
Subscribe
Element Software
Subscribe
H300s
Subscribe
H300s Firmware
Subscribe
H410s
Subscribe
H410s Firmware
Subscribe
H500s
Subscribe
H500s Firmware
Subscribe
H700s
Subscribe
H700s Firmware
Subscribe
Hci Compute Node
Subscribe
Hci Management Node
Subscribe
Solidfire
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Jboss Core Services
Subscribe
Rhel Eus
Subscribe
Splunk
Subscribe
Universal Forwarder
Subscribe
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2025-05-05T16:14:44.468Z
Reserved: 2022-07-06T00:00:00.000Z
Link: CVE-2022-35252
Updated: 2024-08-03T09:29:17.455Z
Status : Modified
Published: 2022-09-23T14:15:12.323
Modified: 2025-05-05T17:18:16.463
Link: CVE-2022-35252
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Ubuntu USN