Skip to main content
Version: latest

CVE-2022-32221

CVE Details

Visit the official vulnerability details page for CVE-2022-32221 to learn more.

Initial Publication

01/14/2025

Last Update

02/21/2025

Third Party Dependency

curl

NIST CVE Summary

When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.

CVE Severity

9.8

Our Official Summary

This is a critical vulnerability in libcurl versions 7.7 through 7.85.0, where reusing a handle for HTTP(S) transfers from a PUT to a POST request can lead to unintended data transmission or potential memory issues. This unexpected behavior can cause the application to: a) Send unintended or incorrect data. b) Potentially access freed memory, leading to undefined behavior or application crashes. This can be exploited by attackers to manipulate the data sent in HTTP requests, potentially leading to information disclosure or remote code execution, depending on the application's context and the nature of the data being handled.

The images where this vulnrability is have controls in place are not accessible outside the cluster. So the attacker needs to gain privileged access to the cluster to attempt this exploit. Also the containers do not allow execution of arbitrary code. Impact of this exploit is also low, since container reduces the attack surface.

Status

Ongoing

Affected Products & Versions

VersionPalette EnterprisePalette Enterprise AirgapVerteXVerteX Airgap
4.5.20⚠️ Impacted✅ No Impact✅ No Impact✅ No Impact
4.5.15⚠️ Impacted✅ No Impact✅ No Impact✅ No Impact

Revision History

DateRevision
02/21/2025Status changed from Open to Ongoing
02/21/2025Official summary added
01/20/2025Impacted versions changed from 4.5.15 to 4.5.15, 4.5.20