Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-9891.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-9891
Upstream
Published
2022-06-02T14:15:51Z
Modified
2026-04-01T05:23:46.767755Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
CVE-2022-30115 affecting package curl for versions less than 7.83.1-1
Details

Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not using one when it built the HSTS cache. Or the otherway around - by having the trailing dot in the HSTS cache and not using thetrailing dot in the URL.

References

Affected packages

Azure Linux:2 / curl

Package

Name
curl
Purl
pkg:rpm/azure-linux/curl

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.83.1-1

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-9891.json"