Vulnerability Name: | CVE-2023-28321 (CCN-255625) | ||||||||||||
Assigned: | 2023-05-17 | ||||||||||||
Published: | 2023-05-17 | ||||||||||||
Updated: | 2023-08-02 | ||||||||||||
Summary: | cURL libcurl could allow a remote attacker to bypass security restrictions, caused by a flaw when listed as "Subject Alternative Name" in TLS server certificates. By sending a specially crafted request, an attacker could exploit this vulnerability to accept mismatch wildcard patterns. | ||||||||||||
CVSS v3 Severity: | 5.9 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N) 5.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
3.2 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N)
| ||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2023-28321 Source: support@hackerone.com Type: Mailing List support@hackerone.com Source: support@hackerone.com Type: Mailing List support@hackerone.com Source: support@hackerone.com Type: Mailing List support@hackerone.com Source: CCN Type: Project curl Security Advisory, May 17 2023 CVE-2023-28321 IDN wildcard match Source: XF Type: UNKNOWN curl-cve202328321-sec-bypass(255625) Source: support@hackerone.com Type: Exploit, Patch, Third Party Advisory support@hackerone.com Source: support@hackerone.com Type: Mailing List, Third Party Advisory support@hackerone.com Source: support@hackerone.com Type: Mailing List, Third Party Advisory support@hackerone.com Source: CCN Type: oss-sec Mailing List, Wed, 17 May 2023 08:41:08 +0200 (CEST) curl: CVE-2023-28321: IDN wildcard match Source: support@hackerone.com Type: Third Party Advisory support@hackerone.com Source: support@hackerone.com Type: Third Party Advisory support@hackerone.com Source: support@hackerone.com Type: Third Party Advisory support@hackerone.com Source: support@hackerone.com Type: Third Party Advisory support@hackerone.com | ||||||||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |