// For flags

CVE-2022-32205

 

Severity Score

4.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A malicious server can serve excessive amounts of `Set-Cookie:` headers in a HTTP response to curl and curl < 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the cookies match, create requests that become larger than the threshold that curl uses internally to avoid sending crazy large requests (1048576 bytes) and instead returns an error.This denial state might remain for as long as the same cookies are kept, match and haven't expired. Due to cookie matching rules, a server on `foo.example.com` can set cookies that also would match for `bar.example.com`, making it it possible for a "sister server" to effectively cause a denial of service for a sibling site on the same second level domain using this method.

Un servidor malicioso puede servir cantidades excesivas de encabezados "Set-Cookie:" en una respuesta HTTP a curl y curl versiones anteriores a 7.84.0 las almacena todas. Una cantidad suficientemente grande de cookies (grandes) hace que las subsiguientes peticiones HTTP a este, o a otros servidores con los que coincidan las cookies, creen peticiones que superen el umbral que curl usa internamente para evitar el envío de peticiones locamente grandes (1048576 bytes) y en su lugar devuelva un error. Este estado de denegación puede permanecer mientras sea mantenidas las mismas cookies, coincidan y no hayan expirado. Debido a las reglas de coincidencia de cookies, un servidor en "foo.example.com" puede establecer cookies que también coincidan para "bar.example.com", haciendo posible que un "servidor hermano" cause efectivamente una denegación de servicio para un sitio hermano en el mismo dominio de segundo nivel usando este método

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
Low
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-06-01 CVE Reserved
  • 2022-06-28 CVE Published
  • 2024-04-21 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-770: Allocation of Resources Without Limits or Throttling
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Netapp
Search vendor "Netapp"
H300s Firmware
Search vendor "Netapp" for product "H300s Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
H300s
Search vendor "Netapp" for product "H300s"
--
Safe
Netapp
Search vendor "Netapp"
H500s Firmware
Search vendor "Netapp" for product "H500s Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
H500s
Search vendor "Netapp" for product "H500s"
--
Safe
Netapp
Search vendor "Netapp"
H700s Firmware
Search vendor "Netapp" for product "H700s Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
H700s
Search vendor "Netapp" for product "H700s"
--
Safe
Netapp
Search vendor "Netapp"
H410s Firmware
Search vendor "Netapp" for product "H410s Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
H410s
Search vendor "Netapp" for product "H410s"
--
Safe
Siemens
Search vendor "Siemens"
Scalance Sc622-2c Firmware
Search vendor "Siemens" for product "Scalance Sc622-2c Firmware"
< 3.0
Search vendor "Siemens" for product "Scalance Sc622-2c Firmware" and version " < 3.0"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance Sc622-2c
Search vendor "Siemens" for product "Scalance Sc622-2c"
--
Safe
Siemens
Search vendor "Siemens"
Scalance Sc626-2c Firmware
Search vendor "Siemens" for product "Scalance Sc626-2c Firmware"
< 3.0
Search vendor "Siemens" for product "Scalance Sc626-2c Firmware" and version " < 3.0"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance Sc626-2c
Search vendor "Siemens" for product "Scalance Sc626-2c"
--
Safe
Siemens
Search vendor "Siemens"
Scalance Sc632-2c Firmware
Search vendor "Siemens" for product "Scalance Sc632-2c Firmware"
< 3.0
Search vendor "Siemens" for product "Scalance Sc632-2c Firmware" and version " < 3.0"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance Sc632-2c
Search vendor "Siemens" for product "Scalance Sc632-2c"
--
Safe
Siemens
Search vendor "Siemens"
Scalance Sc636-2c Firmware
Search vendor "Siemens" for product "Scalance Sc636-2c Firmware"
< 3.0
Search vendor "Siemens" for product "Scalance Sc636-2c Firmware" and version " < 3.0"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance Sc636-2c
Search vendor "Siemens" for product "Scalance Sc636-2c"
--
Safe
Siemens
Search vendor "Siemens"
Scalance Sc642-2c Firmware
Search vendor "Siemens" for product "Scalance Sc642-2c Firmware"
< 3.0
Search vendor "Siemens" for product "Scalance Sc642-2c Firmware" and version " < 3.0"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance Sc642-2c
Search vendor "Siemens" for product "Scalance Sc642-2c"
--
Safe
Siemens
Search vendor "Siemens"
Scalance Sc646-2c Firmware
Search vendor "Siemens" for product "Scalance Sc646-2c Firmware"
< 3.0
Search vendor "Siemens" for product "Scalance Sc646-2c Firmware" and version " < 3.0"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance Sc646-2c
Search vendor "Siemens" for product "Scalance Sc646-2c"
--
Safe
Haxx
Search vendor "Haxx"
Curl
Search vendor "Haxx" for product "Curl"
>= 7.71.0 < 7.84.0
Search vendor "Haxx" for product "Curl" and version " >= 7.71.0 < 7.84.0"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
35
Search vendor "Fedoraproject" for product "Fedora" and version "35"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
11.0
Search vendor "Debian" for product "Debian Linux" and version "11.0"
-
Affected
Netapp
Search vendor "Netapp"
Clustered Data Ontap
Search vendor "Netapp" for product "Clustered Data Ontap"
--
Affected
Netapp
Search vendor "Netapp"
Element Software
Search vendor "Netapp" for product "Element Software"
--
Affected
Netapp
Search vendor "Netapp"
Hci Management Node
Search vendor "Netapp" for product "Hci Management Node"
--
Affected
Netapp
Search vendor "Netapp"
Solidfire
Search vendor "Netapp" for product "Solidfire"
--
Affected
Apple
Search vendor "Apple"
Macos
Search vendor "Apple" for product "Macos"
< 13.0
Search vendor "Apple" for product "Macos" and version " < 13.0"
-
Affected
Splunk
Search vendor "Splunk"
Universal Forwarder
Search vendor "Splunk" for product "Universal Forwarder"
>= 8.2.0 < 8.2.12
Search vendor "Splunk" for product "Universal Forwarder" and version " >= 8.2.0 < 8.2.12"
-
Affected
Splunk
Search vendor "Splunk"
Universal Forwarder
Search vendor "Splunk" for product "Universal Forwarder"
>= 9.0.0 < 9.0.6
Search vendor "Splunk" for product "Universal Forwarder" and version " >= 9.0.0 < 9.0.6"
-
Affected
Splunk
Search vendor "Splunk"
Universal Forwarder
Search vendor "Splunk" for product "Universal Forwarder"
9.1.0
Search vendor "Splunk" for product "Universal Forwarder" and version "9.1.0"
-
Affected