### [CVE-2020-7070](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7070) ![](https://img.shields.io/static/v1?label=Product&message=PHP&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=7.3.x%3C%207.3.23%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%20Improper%20Input%20Validation&color=brighgreen) ### Description In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information. ### POC #### Reference - https://usn.ubuntu.com/4583-1/ - https://usn.ubuntu.com/4583-1/ - https://www.oracle.com/security-alerts/cpuoct2021.html - https://www.oracle.com/security-alerts/cpuoct2021.html #### Github No PoCs found on GitHub currently.