Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
Low
Attack Vector
Network
0

CVE-2022-30115

Disclosure Date: June 02, 2022
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not using one when it built the HSTS cache. Or the otherway around – by having the trailing dot in the HSTS cache and not using thetrailing dot in the URL.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
4.3 Medium
Impact Score:
1.4
Exploitability Score:
2.8
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
Low
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
Low
Integrity (I):
None
Availability (A):
None

General Information

Vendors

  • haxx,
  • netapp,
  • splunk

Products

  • clustered data ontap -,
  • curl,
  • h300s firmware -,
  • h410s firmware -,
  • h500s firmware -,
  • h700s firmware -,
  • hci bootstrap os -,
  • solidfire & hci management node -,
  • solidfire, enterprise sds & hci storage node -,
  • universal forwarder,
  • universal forwarder 9.1.0
Technical Analysis