{"id":"JLSEC-2025-27","summary":"curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MI...","details":"curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly \"short-cut\" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.","modified":"2025-11-06T23:02:46.439893Z","published":"2025-10-10T15:04:01.319Z","upstream":["CVE-2021-22890"],"database_specific":{"sources":[{"url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2021-22890","published":"2021-04-01T18:15:12.917Z","id":"CVE-2021-22890","imported":"2025-10-10T14:33:22.317Z","modified":"2025-06-09T15:15:24.177Z","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22890"}],"license":"CC-BY-4.0"},"references":[{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"type":"WEB","url":"https://curl.se/docs/CVE-2021-22890.html"},{"type":"WEB","url":"https://hackerone.com/reports/1129529"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202105-36"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20210521-0007/"},{"type":"WEB","url":"https://www.oracle.com//security-alerts/cpujul2021.html"}],"affected":[{"package":{"name":"LibCURL_jll","ecosystem":"Julia","purl":"pkg:julia/LibCURL_jll?uuid=deac9b47-8bc7-5906-a0fe-35ac56dc84c0"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"7.81.0+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-27.json"}}],"schema_version":"1.7.3"}