CVE-2018-12910
high-risk
Published 2018-07-05
The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname.
Do I need to act?
~
4.2% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: db2b0d5809d5f8226d47312b40992cadbcde439f
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (13)
References (22)
Third Party Advisory
https://access.redhat.com/errata/RHBA-2019:0327
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3140
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3505
Third Party Advisory
https://gitlab.gnome.org/GNOME/libsoup/issues/3
Third Party Advisory
https://usn.ubuntu.com/3701-1/
Third Party Advisory
https://www.debian.org/security/2018/dsa-4241
Third Party Advisory
https://access.redhat.com/errata/RHBA-2019:0327
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3140
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3505
Third Party Advisory
https://gitlab.gnome.org/GNOME/libsoup/issues/3
and 2 more references
56
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
7/34 · Low
Exposure
17/34 · Moderate