CVE-2024-9681
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
06/11/2024
Last modified:
03/11/2025
Description
When curl is asked to use HSTS, the expiry time for a subdomain might<br />
overwrite a parent domain&#39;s cache entry, making it end sooner or later than<br />
otherwise intended.<br />
<br />
This affects curl using applications that enable HSTS and use URLs with the<br />
insecure `HTTP://` scheme and perform transfers with hosts like<br />
`x.example.com` as well as `example.com` where the first host is a subdomain<br />
of the second host.<br />
<br />
(The HSTS cache either needs to have been populated manually or there needs to<br />
have been previous HTTPS accesses done as the cache needs to have entries for<br />
the domains involved to trigger this problem.)<br />
<br />
When `x.example.com` responds with `Strict-Transport-Security:` headers, this<br />
bug can make the subdomain&#39;s expiry timeout *bleed over* and get set for the<br />
parent domain `example.com` in curl&#39;s HSTS cache.<br />
<br />
The result of a triggered bug is that HTTP accesses to `example.com` get<br />
converted to HTTPS for a different period of time than what was asked for by<br />
the origin server. If `example.com` for example stops supporting HTTPS at its<br />
expiry time, curl might then fail to access `http://example.com` until the<br />
(wrongly set) timeout expires. This bug can also expire the parent&#39;s entry<br />
*earlier*, thus making curl inadvertently switch back to insecure HTTP earlier<br />
than otherwise intended.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:* | 7.74.0 (including) | 8.11.0 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://curl.se/docs/CVE-2024-9681.html
- https://curl.se/docs/CVE-2024-9681.json
- https://hackerone.com/reports/2764830
- http://seclists.org/fulldisclosure/2025/Apr/10
- http://seclists.org/fulldisclosure/2025/Apr/11
- http://seclists.org/fulldisclosure/2025/Apr/12
- http://seclists.org/fulldisclosure/2025/Apr/13
- http://seclists.org/fulldisclosure/2025/Apr/4
- http://seclists.org/fulldisclosure/2025/Apr/5
- http://seclists.org/fulldisclosure/2025/Apr/8
- http://seclists.org/fulldisclosure/2025/Apr/9
- http://www.openwall.com/lists/oss-security/2024/11/06/2
- https://security.netapp.com/advisory/ntap-20241213-0006/



