endpointlabs / VulnerableDotNetCore3Project

.Net Core 3.0
0 stars 0 forks source link

CVE-2021-22946 | curl (CWE-319) #6

Open mgulter opened 2 years ago

mgulter commented 2 years ago

A high severity vulnerability has been discovered in your project.

Project Name: IssueTest

Scanner Name: trivy

Cwe ID: 319

Cwe Name: Cleartext Transmission of Sensitive Information

Cwe Link: https://cwe.mitre.org/data/definitions/319.html

CVE ID: CVE-2021-22946

Target: nginx:latest (debian 11.3)

Packages:

References:

Training(Secure Code Warrior):

Tool Description: A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (--ssl-reqd on the command line orCURLOPT_USE_SSL set to CURLUSESSL_CONTROL or CURLUSESSL_ALL withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations withoutTLS contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.

Custom Description: test