Skip to main content

Improper Validation of Integrity Check Value

CVE-2021-22922

Severity Medium
Score 6.5/10

Summary

When curl is instructed to download content using the metalink feature, the contents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same content from a set of different URLs, potentially hosted by different servers and the client can then download the file from one or several of them. In a serial or parallel manner. If one of the servers hosting the contents has been breached and the contents of the specific file on that server is replaced with a modified payload, curl should detect this when the hash of the file mismatches after a completed download. It should remove the contents and instead try getting the contents from another URL. This is not done, and instead, such a hash mismatch is only mentioned in the text and the potentially malicious content is kept in the file on disk. Curl 7.27.0 through 7.77.0 are vulnerable.

  • LOW
  • NETWORK
  • HIGH
  • UNCHANGED
  • REQUIRED
  • NONE
  • NONE
  • NONE

CWE-354 - Improper Validation of Integrity Check Value

The software does not validate or incorrectly validates the integrity check values or "checksums" of a message. This may prevent it from detecting if the data has been modified or corrupted in transmission.

Advisory Timeline

  • Published