CVE-2022-35252: Improper Input Validation (CWE-20) in https://github.com/curl/curl
When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service to all siblings.
AI Analysis
Technical Summary
CVE-2022-35252 is a vulnerability in the curl tool, specifically related to its handling of cookies retrieved from HTTP(S) servers. Curl is a widely used command-line tool and library for transferring data with URLs, supporting numerous protocols including HTTP and HTTPS. The vulnerability stems from improper input validation (CWE-20) when curl parses cookies containing control codes. These control codes, when accepted and later sent back to an HTTP server, can cause the server to respond with HTTP 400 (Bad Request) errors. This behavior can be exploited by a "sister site"—a site related or connected to the target server—to effectively deny service to all sibling sites by causing their HTTP requests to be rejected. The issue was fixed in curl version 7.85.0. The CVSS v3.1 base score is 3.7, indicating a low severity vulnerability. The attack vector is network-based (AV:N), requires high attack complexity (AC:H), no privileges (PR:N), no user interaction (UI:N), and impacts only availability (A:L) with no confidentiality or integrity impact. No known exploits are reported in the wild. The vulnerability primarily affects systems using vulnerable versions of curl that handle cookies from HTTP(S) servers, which is common in many automated scripts, CI/CD pipelines, and software relying on curl for HTTP communications.
Potential Impact
For European organizations, the impact of this vulnerability is generally low but non-negligible. Organizations relying on curl for automated HTTP interactions, especially those that handle multiple related web services or microservices communicating via HTTP cookies, could experience service disruptions. The denial of service is indirect and requires a malicious or compromised "sister site" to send crafted cookies that trigger HTTP 400 errors on sibling sites. This could affect web services, APIs, or internal tools that depend on curl for cookie management. While the vulnerability does not compromise confidentiality or integrity, availability disruptions could impact business operations, particularly for organizations with complex web service architectures or those using curl in critical automation workflows. Since exploitation requires network access and high attack complexity, the risk is mitigated but still relevant for high-value targets or environments with interconnected web services.
Mitigation Recommendations
European organizations should ensure that all systems using curl are updated to version 7.85.0 or later, where this vulnerability is fixed. Beyond patching, organizations should audit their use of curl in automation scripts, CI/CD pipelines, and web service interactions to identify any reliance on cookie handling that could be exploited. Network segmentation and strict access controls can limit exposure to potentially malicious "sister sites." Implementing web application firewalls (WAFs) or HTTP request validation to detect and block malformed cookies or suspicious HTTP requests can further reduce risk. Monitoring HTTP 400 error rates and correlating with cookie data may help detect attempted exploitation. Additionally, organizations should review their cookie policies and ensure that cookie inputs are sanitized or validated before being processed or forwarded by curl-based tools.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2022-35252: Improper Input Validation (CWE-20) in https://github.com/curl/curl
Description
When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service to all siblings.
AI-Powered Analysis
Technical Analysis
CVE-2022-35252 is a vulnerability in the curl tool, specifically related to its handling of cookies retrieved from HTTP(S) servers. Curl is a widely used command-line tool and library for transferring data with URLs, supporting numerous protocols including HTTP and HTTPS. The vulnerability stems from improper input validation (CWE-20) when curl parses cookies containing control codes. These control codes, when accepted and later sent back to an HTTP server, can cause the server to respond with HTTP 400 (Bad Request) errors. This behavior can be exploited by a "sister site"—a site related or connected to the target server—to effectively deny service to all sibling sites by causing their HTTP requests to be rejected. The issue was fixed in curl version 7.85.0. The CVSS v3.1 base score is 3.7, indicating a low severity vulnerability. The attack vector is network-based (AV:N), requires high attack complexity (AC:H), no privileges (PR:N), no user interaction (UI:N), and impacts only availability (A:L) with no confidentiality or integrity impact. No known exploits are reported in the wild. The vulnerability primarily affects systems using vulnerable versions of curl that handle cookies from HTTP(S) servers, which is common in many automated scripts, CI/CD pipelines, and software relying on curl for HTTP communications.
Potential Impact
For European organizations, the impact of this vulnerability is generally low but non-negligible. Organizations relying on curl for automated HTTP interactions, especially those that handle multiple related web services or microservices communicating via HTTP cookies, could experience service disruptions. The denial of service is indirect and requires a malicious or compromised "sister site" to send crafted cookies that trigger HTTP 400 errors on sibling sites. This could affect web services, APIs, or internal tools that depend on curl for cookie management. While the vulnerability does not compromise confidentiality or integrity, availability disruptions could impact business operations, particularly for organizations with complex web service architectures or those using curl in critical automation workflows. Since exploitation requires network access and high attack complexity, the risk is mitigated but still relevant for high-value targets or environments with interconnected web services.
Mitigation Recommendations
European organizations should ensure that all systems using curl are updated to version 7.85.0 or later, where this vulnerability is fixed. Beyond patching, organizations should audit their use of curl in automation scripts, CI/CD pipelines, and web service interactions to identify any reliance on cookie handling that could be exploited. Network segmentation and strict access controls can limit exposure to potentially malicious "sister sites." Implementing web application firewalls (WAFs) or HTTP request validation to detect and block malformed cookies or suspicious HTTP requests can further reduce risk. Monitoring HTTP 400 error rates and correlating with cookie data may help detect attempted exploitation. Additionally, organizations should review their cookie policies and ensure that cookie inputs are sanitized or validated before being processed or forwarded by curl-based tools.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- hackerone
- Date Reserved
- 2022-07-06T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdc2bf
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/7/2025, 12:09:59 AM
Last updated: 2/2/2026, 8:49:42 AM
Views: 51
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20422: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8775, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
HighCVE-2026-20421: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8791
HighCVE-2026-20420: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8676, MT8791
HighCVE-2026-20419: CWE-754 Improper Check for Unusual or Exceptional Conditions in MediaTek, Inc. MT6890, MT6989TB, MT7902, MT7915, MT7916, MT7920, MT7921, MT7922, MT7925, MT7927, MT7981, MT7986, MT8196, MT8668, MT8676, MT8678, MT8775, MT8791T, MT8792, MT8793, MT8796, MT8873, MT8883, MT8893, MT8910
HighCVE-2026-20418: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT7931, MT7933
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.