
Cloud Vulnerability DB
A community-led vulnerabilities database
When curl < 7.84.0 performs FTP transfers secured by krb5, it handles message verification failures incorrectly. This vulnerability (CVE-2022-32208) was introduced in curl 7.16.4 and makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows data injection to the client (Curl Docs).
The vulnerability typically causes curl to insert 599 (+ terminating null) bytes into the data where it detects the error, followed by the attacker's data. This requires attackers to handle this initial hard-coded 5-byte sequence of 'junk' in their exploit. The vulnerability affects FTP-KRB, which is noted as a rarely used feature. The issue is classified as CWE-924: Improper Enforcement of Message Integrity During Transmission in a Communication Channel (Curl Docs).
The vulnerability enables Man-in-the-Middle (MITM) attacks to go undetected and allows attackers to inject data to the client. This poses a significant security risk as it compromises the integrity of data transfers and enables potential malicious data injection (Curl Docs, Ubuntu Security).
The vulnerability was fixed in curl version 7.84.0. Users are recommended to either upgrade to curl version 7.84.0 or later, apply the available patch to their local version, or avoid using KRB-FTP. The fix was implemented through commit 6ecdf5136b52af7 (Curl Docs).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."