cve/2022/CVE-2022-27780.md

19 lines
997 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-27780](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27780)
![](https://img.shields.io/static/v1?label=Product&message=https%3A%2F%2Fgithub.com%2Fcurl%2Fcurl&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Handling%20of%20URL%20Encoding%20(Hex%20Encoding)%20(CWE-177)&color=brighgreen)
### Description
The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like `http://example.com%2F127.0.0.1/`, would be allowed bythe parser and get transposed into `http://example.com/127.0.0.1/`. This flawcan be used to circumvent filters, checks and more.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/fokypoky/places-list