cve/2020/CVE-2020-7070.md

21 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-7070](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7070)
![](https://img.shields.io/static/v1?label=Product&message=PHP&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=7.3.x%3C%207.3.23%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%20Improper%20Input%20Validation&color=brighgreen)
### Description
In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information.
### POC
#### Reference
- https://usn.ubuntu.com/4583-1/
2024-06-09 00:33:16 +00:00
- https://usn.ubuntu.com/4583-1/
2024-05-25 21:48:12 +02:00
- https://www.oracle.com/security-alerts/cpuoct2021.html
2024-06-09 00:33:16 +00:00
- https://www.oracle.com/security-alerts/cpuoct2021.html
2024-05-25 21:48:12 +02:00
#### Github
No PoCs found on GitHub currently.