{"id":"CVE-2023-32762","details":"An issue was discovered in Qt before 5.15.14, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. Qt Network incorrectly parses the strict-transport-security (HSTS) header, allowing unencrypted connections to be established, even when explicitly prohibited by the server. This happens if the case used for this header does not exactly match.","modified":"2026-04-16T04:31:23.732536949Z","published":"2023-05-28T23:15:09.570Z","related":["SUSE-SU-2023:2982-1","SUSE-SU-2023:3018-1","SUSE-SU-2023:3207-1","SUSE-SU-2023:3225-1","SUSE-SU-2023:3380-1","openSUSE-SU-2024:12955-1","openSUSE-SU-2024:13289-1"],"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00027.html"},{"type":"FIX","url":"https://lists.qt-project.org/pipermail/announce/2023-May/000414.html"},{"type":"FIX","url":"https://codereview.qt-project.org/c/qt/qtbase/+/476140"},{"type":"FIX","url":"https://github.com/qt/qtbase/commit/1b736a815be0222f4b24289cf17575fc15707305"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/qt/qtbase","events":[{"introduced":"f6b36eaafec24b4c67efff621d380a4ca4257d0b"},{"fixed":"86c62c8f6088ec148512457cb7e964661ba643b0"},{"introduced":"fc9cda5f08ac848e88f63dd4a07c08b2fbc6bf17"},{"fixed":"f131837a9fcc83dcfb70a0a91b1baacb6ccf14a2"},{"introduced":"9554d315aa74eaba1726405ee09117e2ebc6111f"},{"fixed":"55aee8697512af105dfefabc1e2ec41d4df1e45e"},{"fixed":"1b736a815be0222f4b24289cf17575fc15707305"}],"database_specific":{"versions":[{"introduced":"5.9.0"},{"fixed":"5.15.14"},{"introduced":"6.0.0"},{"fixed":"6.2.9"},{"introduced":"6.3.0"},{"fixed":"6.5.1"}]}}],"database_specific":{"vanir_signatures_modified":"2026-04-12T03:51:16Z","vanir_signatures":[{"target":{"file":"src/network/access/qhsts.cpp"},"id":"CVE-2023-32762-1d1a0a9d","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["198455504285215276206513920714838399588","280746894577215508959761652343184383218","248521215612386692078688414216867720462","66058527147137772403119859541830059642"]},"source":"https://github.com/qt/qtbase/commit/1b736a815be0222f4b24289cf17575fc15707305","deprecated":false,"signature_version":"v1"},{"target":{"file":"tests/auto/network/access/hsts/tst_qhsts.cpp","function":"tst_QHsts::testSTSHeaderParser"},"id":"CVE-2023-32762-65be528c","signature_type":"Function","source":"https://github.com/qt/qtbase/commit/1b736a815be0222f4b24289cf17575fc15707305","digest":{"length":3714,"function_hash":"202253668995713526950139037894621624785"},"deprecated":false,"signature_version":"v1"},{"target":{"file":"src/network/kernel/qdnslookup_unix.cpp"},"id":"CVE-2023-32762-95a33edc","signature_type":"Line","deprecated":false,"source":"https://github.com/qt/qtbase/commit/55aee8697512af105dfefabc1e2ec41d4df1e45e","digest":{"threshold":0.9,"line_hashes":["92376634840184399825365318154288351993","232461204609313989120257745717201240216","320708743009817993507337202164167887441","21308290995217884491005044431632010900","298034914405986548572445818450155724325","171355919169060797509597056785544202524","1069687939198931456973687425830032072","3540876834910303010839964264776335282","119893641728366708810635981190240492131","135558535485227323371703831987671565962","218424658944840923178893068857589239342","180130516929332699035191217939835434911","171902681780682419451758795992574159417","194908686061445372061155934280632091709","25828914292029408919762996279289826136","271381063204330631592675759559091485281","188826755362610565145874472998653610620","61181470149620454368846073938918120330","144456116250144122357606448252883560018","210431344564871427713284927923317729215","33720891528493242799779644168988618648","131451878779952217380213242484707842149","163457716009692412014758585930328269677","48972863578760833987644564696874645146"]},"signature_version":"v1"},{"target":{"file":"src/network/kernel/qdnslookup_unix.cpp","function":"QDnsLookupRunnable::query"},"id":"CVE-2023-32762-b3d99a5e","signature_type":"Function","source":"https://github.com/qt/qtbase/commit/55aee8697512af105dfefabc1e2ec41d4df1e45e","digest":{"length":7904,"function_hash":"328679296815467547461728943587483981886"},"deprecated":false,"signature_version":"v1"}],"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-32762.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}]}