Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:haxx:curl:8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B3F10DBE-EB62-4DCA-A46B-651A39A3502B", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to\nthe same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check."}, {"lang": "es", "value": "curl inadvertidamente mantuvo el ID de sesi\u00f3n SSL para las conexiones en su cach\u00e9 incluso cuando fall\u00f3 la prueba de verificaci\u00f3n del estado (*OCSP stapling*). Una transferencia posterior al mismo nombre de host podr\u00eda tener \u00e9xito si la cach\u00e9 de ID de sesi\u00f3n a\u00fan estuviera actualizada, lo que luego omitir\u00eda la verificaci\u00f3n de estado de verificaci\u00f3n."}], "id": "CVE-2024-0853", "lastModified": "2024-11-21T08:47:30.450", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2024-02-03T14:15:50.850", "references": [{"source": "2499f714-1537-4658-8207-48ae4bb9eae9", "tags": ["Vendor Advisory"], "url": "https://curl.se/docs/CVE-2024-0853.html"}, {"source": "2499f714-1537-4658-8207-48ae4bb9eae9", "tags": ["Vendor Advisory"], "url": "https://curl.se/docs/CVE-2024-0853.json"}, {"source": "2499f714-1537-4658-8207-48ae4bb9eae9", "tags": ["Exploit", "Issue Tracking"], "url": "https://hackerone.com/reports/2298922"}, {"source": "2499f714-1537-4658-8207-48ae4bb9eae9", "url": "https://security.netapp.com/advisory/ntap-20240307-0004/"}, {"source": "2499f714-1537-4658-8207-48ae4bb9eae9", "url": "https://security.netapp.com/advisory/ntap-20240426-0009/"}, {"source": "2499f714-1537-4658-8207-48ae4bb9eae9", "url": "https://security.netapp.com/advisory/ntap-20240503-0012/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://curl.se/docs/CVE-2024-0853.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://curl.se/docs/CVE-2024-0853.json"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking"], "url": "https://hackerone.com/reports/2298922"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20240307-0004/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20240426-0009/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20240503-0012/"}], "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-295"}], "source": "nvd@nist.gov", "type": "Primary"}]}