{"id":"CURL-CVE-2024-2466","summary":"TLS certificate check bypass with mbedTLS","details":"libcurl did not check the server certificate of TLS connections done to a host\nspecified as an IP address, when built to use mbedTLS.\n\nlibcurl would wrongly avoid using the set hostname function when the specified\nhostname was given as an IP address, therefore completely skipping the\ncertificate check. This affects all uses of TLS protocols (HTTPS, FTPS, IMAPS,\nPOPS3, SMTPS, etc).","aliases":["CVE-2024-2466"],"modified":"2024-06-07T13:53:51Z","published":"2024-03-27T08:00:00Z","database_specific":{"www":"https://curl.se/docs/CVE-2024-2466.html","issue":"https://hackerone.com/reports/2416725","severity":"Medium","award":{"amount":"2540","currency":"USD"},"CWE":{"desc":"Improper Validation of Certificate with Host Mismatch","id":"CWE-297"},"URL":"https://curl.se/docs/CVE-2024-2466.json","package":"curl","last_affected":"8.6.0","affects":"both"},"affected":[{"ranges":[{"type":"SEMVER","events":[{"introduced":"8.5.0"},{"fixed":"8.7.0"}]},{"type":"GIT","repo":"https://github.com/curl/curl.git","events":[{"introduced":"fa714830e92cba7b16b9d3f2cc92a72ee9d821fa"},{"fixed":"3d0fd382a29b95561b90b7ea3e7eb04dfdd43538"}]}],"versions":["8.6.0","8.5.0"],"database_specific":{"vanir_signatures":[{"signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["35164240309145216823210455688732227964","170207766832450195305766575509655711767","279076801873133192074144897596595760991","38712474459906527682190742064425929060","296746372243249932904272205558101137499","289186014989873516532444646310622965665","235608606007454762018156356841211366658","213535413285472025897417683868173990226"]},"deprecated":false,"target":{"file":"lib/vtls/mbedtls.c"},"id":"CURL-CVE-2024-2466-499f0287","signature_version":"v1","source":"https://github.com/curl/curl.git/commit/3d0fd382a29b95561b90b7ea3e7eb04dfdd43538"},{"signature_type":"Function","digest":{"length":9028,"function_hash":"81750412380569256973551501638685022582"},"deprecated":false,"target":{"file":"lib/vtls/mbedtls.c","function":"mbed_connect_step1"},"id":"CURL-CVE-2024-2466-8a528aff","signature_version":"v1","source":"https://github.com/curl/curl.git/commit/3d0fd382a29b95561b90b7ea3e7eb04dfdd43538"}],"source":"https://curl.se/docs/CURL-CVE-2024-2466.json"}}],"schema_version":"1.7.3","credits":[{"name":"Frank Yueh","type":"FINDER"},{"name":"Stefan Eissing","type":"REMEDIATION_DEVELOPER"}]}