Miggo Logo

CVE-2022-27776:
A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak...

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.69796%
Published
6/3/2022
Updated
4/7/2024
KEV Status
No
Technology
-

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability occurs when curl follows an HTTP redirect to the same hostname but a different port number, and it incorrectly sends authentication headers (like Authorization:) or Cookie: headers to the new port. The fix introduces a new function allow_auth_to_host which checks not only the hostname but also the port and protocol before allowing sensitive headers to be sent. The functions Curl_http_output_auth (for authentication headers) and Curl_add_custom_headers (for cookie headers) were modified to use this new stricter check. Therefore, these two functions were the ones that previously exhibited the vulnerable behavior by sending sensitive information under insecure redirect conditions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* insu**i*i*ntly prot**t** *r***nti*ls vuln*r**ility in *ix** in *url *.**.* mi**t l**k *ut**nti**tion or *ooki* *****r **t* on *TTP r**ir**ts to t** s*m* *ost *ut *not**r port num**r.

Reasoning

T** vuln*r**ility o**urs w**n *url *ollows *n *TTP r**ir**t to t** s*m* *ostn*m* *ut * *i***r*nt port num**r, *n* it in*orr**tly s*n*s *ut**nti**tion *****rs (lik* *ut*oriz*tion:) or *ooki*: *****rs to t** n*w port. T** *ix intro*u**s * n*w *un*tion