CVE-2021-22947: STARTTLS protocol injection via MITM
Medium
C
curl
Submitted None
Actions:
Reported by
monnerat
Vulnerability Details
Technical details and impact analysis
## Summary:
A man-in-the-middle can inject cleartext forged responses to future encrypted commands by pipelining them to the STARTTLS response.
## Steps To Reproduce:
Use the attached test case within the curl test system. It is based on IMAP FETCH with explicit TLS. Upon test failure, the downloaded file contains "You've been hacked!" rather than the requested mail.
## Impact
Mailbox content forgery (IMAP, POP3).
Sent mail content forgery (SMTP).
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cryptographic Issues - Generic