Improper Certificate Validation Affecting curl package, versions [7.41.0,8.10.0)
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UNMANAGED-CURL-7931007
- published 11 Sep 2024
- disclosed 11 Sep 2024
- credit Hiroki Kurosawa
Introduced: 11 Sep 2024
CVE-2024-8096 Open this link in a new tabHow to fix?
Upgrade curl
to version 8.10.0 or higher.
Overview
curl is a command line tool and library for transferring data with URL syntax, supporting DICT, FILE, FTP, FTPS, GOPHER, GOPHERS, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, MQTT, POP3, POP3S, RTMP, RTMPS, RTSP, SCP, SFTP, SMB, SMBS, SMTP, SMTPS, TELNET and TFTP. libcurl offers a myriad of powerful features.
Affected versions of this package are vulnerable to Improper Certificate Validation due to improper validation of OCSP responses. An attacker can mislead the system into accepting an invalid server certificate as valid by exploiting the failure to correctly handle certain OCSP response statuses (like for example "unauthorized").
Note:
This issue only exists when curl is built to use the GnuTLS library.