CVE-2022-35252: Improper Input Validation (CWE-20) in https://github.com/curl/curl
When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service to all siblings.
AI Analysis
Technical Summary
CVE-2022-35252 is a vulnerability in the curl tool, specifically related to its handling of cookies retrieved from HTTP(S) servers. Curl is a widely used command-line tool and library for transferring data with URLs, supporting numerous protocols including HTTP and HTTPS. The vulnerability stems from improper input validation (CWE-20) when curl parses cookies containing control codes. These control codes, when accepted and later sent back to an HTTP server, can cause the server to respond with HTTP 400 (Bad Request) errors. This behavior can be exploited by a "sister site"—a site related or connected to the target server—to effectively deny service to all sibling sites by causing their HTTP requests to be rejected. The issue was fixed in curl version 7.85.0. The CVSS v3.1 base score is 3.7, indicating a low severity vulnerability. The attack vector is network-based (AV:N), requires high attack complexity (AC:H), no privileges (PR:N), no user interaction (UI:N), and impacts only availability (A:L) with no confidentiality or integrity impact. No known exploits are reported in the wild. The vulnerability primarily affects systems using vulnerable versions of curl that handle cookies from HTTP(S) servers, which is common in many automated scripts, CI/CD pipelines, and software relying on curl for HTTP communications.
Potential Impact
For European organizations, the impact of this vulnerability is generally low but non-negligible. Organizations relying on curl for automated HTTP interactions, especially those that handle multiple related web services or microservices communicating via HTTP cookies, could experience service disruptions. The denial of service is indirect and requires a malicious or compromised "sister site" to send crafted cookies that trigger HTTP 400 errors on sibling sites. This could affect web services, APIs, or internal tools that depend on curl for cookie management. While the vulnerability does not compromise confidentiality or integrity, availability disruptions could impact business operations, particularly for organizations with complex web service architectures or those using curl in critical automation workflows. Since exploitation requires network access and high attack complexity, the risk is mitigated but still relevant for high-value targets or environments with interconnected web services.
Mitigation Recommendations
European organizations should ensure that all systems using curl are updated to version 7.85.0 or later, where this vulnerability is fixed. Beyond patching, organizations should audit their use of curl in automation scripts, CI/CD pipelines, and web service interactions to identify any reliance on cookie handling that could be exploited. Network segmentation and strict access controls can limit exposure to potentially malicious "sister sites." Implementing web application firewalls (WAFs) or HTTP request validation to detect and block malformed cookies or suspicious HTTP requests can further reduce risk. Monitoring HTTP 400 error rates and correlating with cookie data may help detect attempted exploitation. Additionally, organizations should review their cookie policies and ensure that cookie inputs are sanitized or validated before being processed or forwarded by curl-based tools.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2022-35252: Improper Input Validation (CWE-20) in https://github.com/curl/curl
Description
When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service to all siblings.
AI-Powered Analysis
Technical Analysis
CVE-2022-35252 is a vulnerability in the curl tool, specifically related to its handling of cookies retrieved from HTTP(S) servers. Curl is a widely used command-line tool and library for transferring data with URLs, supporting numerous protocols including HTTP and HTTPS. The vulnerability stems from improper input validation (CWE-20) when curl parses cookies containing control codes. These control codes, when accepted and later sent back to an HTTP server, can cause the server to respond with HTTP 400 (Bad Request) errors. This behavior can be exploited by a "sister site"—a site related or connected to the target server—to effectively deny service to all sibling sites by causing their HTTP requests to be rejected. The issue was fixed in curl version 7.85.0. The CVSS v3.1 base score is 3.7, indicating a low severity vulnerability. The attack vector is network-based (AV:N), requires high attack complexity (AC:H), no privileges (PR:N), no user interaction (UI:N), and impacts only availability (A:L) with no confidentiality or integrity impact. No known exploits are reported in the wild. The vulnerability primarily affects systems using vulnerable versions of curl that handle cookies from HTTP(S) servers, which is common in many automated scripts, CI/CD pipelines, and software relying on curl for HTTP communications.
Potential Impact
For European organizations, the impact of this vulnerability is generally low but non-negligible. Organizations relying on curl for automated HTTP interactions, especially those that handle multiple related web services or microservices communicating via HTTP cookies, could experience service disruptions. The denial of service is indirect and requires a malicious or compromised "sister site" to send crafted cookies that trigger HTTP 400 errors on sibling sites. This could affect web services, APIs, or internal tools that depend on curl for cookie management. While the vulnerability does not compromise confidentiality or integrity, availability disruptions could impact business operations, particularly for organizations with complex web service architectures or those using curl in critical automation workflows. Since exploitation requires network access and high attack complexity, the risk is mitigated but still relevant for high-value targets or environments with interconnected web services.
Mitigation Recommendations
European organizations should ensure that all systems using curl are updated to version 7.85.0 or later, where this vulnerability is fixed. Beyond patching, organizations should audit their use of curl in automation scripts, CI/CD pipelines, and web service interactions to identify any reliance on cookie handling that could be exploited. Network segmentation and strict access controls can limit exposure to potentially malicious "sister sites." Implementing web application firewalls (WAFs) or HTTP request validation to detect and block malformed cookies or suspicious HTTP requests can further reduce risk. Monitoring HTTP 400 error rates and correlating with cookie data may help detect attempted exploitation. Additionally, organizations should review their cookie policies and ensure that cookie inputs are sanitized or validated before being processed or forwarded by curl-based tools.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- hackerone
- Date Reserved
- 2022-07-06T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdc2bf
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/7/2025, 12:09:59 AM
Last updated: 8/7/2025, 7:39:09 AM
Views: 15
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.