Unknown
CVE-2023-28321
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2023-28321
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
An improper certificate validation vulnerability exists in curl <v8.1.0
in the way it supports matching of wildcard patterns when listed as “Subject Alternative Name” in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with xn--
and should not be allowed to pattern match, but the wildcard check in curl could still check for x*
, which would match even though the IDN name most likely contained nothing even resembling an x
.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- apple,
- debian,
- fedoraproject,
- haxx,
- netapp
Products
- clustered data ontap -,
- curl,
- debian linux 10.0,
- fedora 37,
- fedora 38,
- h300s firmware -,
- h410s firmware -,
- h500s firmware -,
- h700s firmware -,
- macos,
- ontap antivirus connector -
References
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: