Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-35252: Improper Input Validation (CWE-20) in https://github.com/curl/curl

0
Low
VulnerabilityCVE-2022-35252cvecve-2022-35252cwe-20
Published: Fri Sep 23 2022 (09/23/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: https://github.com/curl/curl

Description

When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service to all siblings.

AI-Powered Analysis

AILast updated: 07/07/2025, 00:09:59 UTC

Technical Analysis

CVE-2022-35252 is a vulnerability in the curl tool, specifically related to its handling of cookies retrieved from HTTP(S) servers. Curl is a widely used command-line tool and library for transferring data with URLs, supporting numerous protocols including HTTP and HTTPS. The vulnerability stems from improper input validation (CWE-20) when curl parses cookies containing control codes. These control codes, when accepted and later sent back to an HTTP server, can cause the server to respond with HTTP 400 (Bad Request) errors. This behavior can be exploited by a "sister site"—a site related or connected to the target server—to effectively deny service to all sibling sites by causing their HTTP requests to be rejected. The issue was fixed in curl version 7.85.0. The CVSS v3.1 base score is 3.7, indicating a low severity vulnerability. The attack vector is network-based (AV:N), requires high attack complexity (AC:H), no privileges (PR:N), no user interaction (UI:N), and impacts only availability (A:L) with no confidentiality or integrity impact. No known exploits are reported in the wild. The vulnerability primarily affects systems using vulnerable versions of curl that handle cookies from HTTP(S) servers, which is common in many automated scripts, CI/CD pipelines, and software relying on curl for HTTP communications.

Potential Impact

For European organizations, the impact of this vulnerability is generally low but non-negligible. Organizations relying on curl for automated HTTP interactions, especially those that handle multiple related web services or microservices communicating via HTTP cookies, could experience service disruptions. The denial of service is indirect and requires a malicious or compromised "sister site" to send crafted cookies that trigger HTTP 400 errors on sibling sites. This could affect web services, APIs, or internal tools that depend on curl for cookie management. While the vulnerability does not compromise confidentiality or integrity, availability disruptions could impact business operations, particularly for organizations with complex web service architectures or those using curl in critical automation workflows. Since exploitation requires network access and high attack complexity, the risk is mitigated but still relevant for high-value targets or environments with interconnected web services.

Mitigation Recommendations

European organizations should ensure that all systems using curl are updated to version 7.85.0 or later, where this vulnerability is fixed. Beyond patching, organizations should audit their use of curl in automation scripts, CI/CD pipelines, and web service interactions to identify any reliance on cookie handling that could be exploited. Network segmentation and strict access controls can limit exposure to potentially malicious "sister sites." Implementing web application firewalls (WAFs) or HTTP request validation to detect and block malformed cookies or suspicious HTTP requests can further reduce risk. Monitoring HTTP 400 error rates and correlating with cookie data may help detect attempted exploitation. Additionally, organizations should review their cookie policies and ensure that cookie inputs are sanitized or validated before being processed or forwarded by curl-based tools.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
hackerone
Date Reserved
2022-07-06T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc2bf

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/7/2025, 12:09:59 AM

Last updated: 2/2/2026, 8:49:42 AM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2026-20422: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8775, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

High
VulnerabilityMon Feb 02 2026

CVE-2026-20421: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8791

High
VulnerabilityMon Feb 02 2026

CVE-2026-20420: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8676, MT8791

High
VulnerabilityMon Feb 02 2026

CVE-2026-20419: CWE-754 Improper Check for Unusual or Exceptional Conditions in MediaTek, Inc. MT6890, MT6989TB, MT7902, MT7915, MT7916, MT7920, MT7921, MT7922, MT7925, MT7927, MT7981, MT7986, MT8196, MT8668, MT8676, MT8678, MT8775, MT8791T, MT8792, MT8793, MT8796, MT8873, MT8883, MT8893, MT8910

High
VulnerabilityMon Feb 02 2026

CVE-2026-20418: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT7931, MT7933

High
VulnerabilityMon Feb 02 2026

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats