curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (OCSP stapling) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.
{
"package": "curl",
"CWE": {
"desc": "Improper Check for Certificate Revocation",
"id": "CWE-299"
},
"issue": "https://hackerone.com/reports/2298922",
"award": {
"amount": "540",
"currency": "USD"
},
"www": "https://curl.se/docs/CVE-2024-0853.html",
"URL": "https://curl.se/docs/CVE-2024-0853.json",
"last_affected": "8.5.0",
"affects": "both",
"severity": "Low"
}[
{
"source": "https://github.com/curl/curl.git/commit/c28e9478cb2548848eca9b765d0d409bfb18668c",
"digest": {
"length": 5025.0,
"function_hash": "238450730006193140542600700210748384811"
},
"id": "CURL-CVE-2024-0853-79861d54",
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "servercert",
"file": "lib/vtls/openssl.c"
},
"signature_type": "Function"
},
{
"source": "https://github.com/curl/curl.git/commit/c28e9478cb2548848eca9b765d0d409bfb18668c",
"digest": {
"threshold": 0.9,
"line_hashes": [
"114497631425936863817012993526107534880",
"115198909464429285217625058644659829226",
"10745843113687217952865983450508381750",
"237704628286891606960412530438035785442"
]
},
"id": "CURL-CVE-2024-0853-ce49dbcc",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "lib/vtls/openssl.c"
},
"signature_type": "Line"
}
]