We found results for “”
CVE-2020-1045
Good to know:
Date: September 10, 2020
<p>A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.</p> <p>The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.</p> <p>The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names.</p>
Language: C#
Severity Score
Related Resources (17)
Severity Score
Weakness Type (CWE)
Insufficient Information
NVD-CWE-noinfoTop Fix
Upgrade Version
Upgrade to version microsoft.aspnetcore.http - 2.1.22;microsoft.aspnetcore.app - 2.1.22;microsoft.owin - 4.1.1;microsoft.aspnetcore.app.runtime.linux-arm - 3.1.8;microsoft.aspnetcore.app.runtime.linux-arm64 - 3.1.8;microsoft.aspnetcore.app.runtime.linux-musl-x64 - 3.1.8;microsoft.aspnetcore.app.runtime.linux-x64 - 3.1.8;microsoft.aspnetcore.app.runtime.osx-x64 - 3.1.8;microsoft.aspnetcore.app.runtime.win-arm - 3.1.8;microsoft.aspnetcore.app.runtime.win-x64 - 3.1.8;microsoft.aspnetcore.app.runtime.win-x86 - 3.1.8;microsoft.aspnetcore.app.runtime.linux-musl-arm64 - 3.1.8;microsoft.aspnetcore.app.runtime.win-arm64 - 3.1.8
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | HIGH |
| Availability (A): | NONE |
CVSS v2
| Base Score: |
|
|---|---|
| Access Vector (AV): | NETWORK |
| Access Complexity (AC): | LOW |
| Authentication (AU): | NONE |
| Confidentiality (C): | NONE |
| Integrity (I): | PARTIAL |
| Availability (A): | NONE |
| Additional information: |
Vulnerabilities
Projects
Contact Us


