CVE-2020-7070
high-risk
Published 2020-10-02
In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information.
Do I need to act?
!
26.1% chance of exploitation in next 30 days
EPSS score — higher than 74% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.3/10
Medium
NETWORK
/ LOW complexity
Affected Products (15)
References (30)
Third Party Advisory
http://cve.circl.lu/cve/CVE-2020-8184
Issue Tracking
https://bugs.php.net/bug.php?id=79699
Third Party Advisory
https://security.gentoo.org/glsa/202012-16
Third Party Advisory
https://security.netapp.com/advisory/ntap-20201016-0001/
Third Party Advisory
https://usn.ubuntu.com/4583-1/
Third Party Advisory
https://www.debian.org/security/2021/dsa-4856
Not Applicable
https://www.oracle.com/security-alerts/cpuoct2021.html
Third Party Advisory
https://www.tenable.com/security/tns-2021-14
Third Party Advisory
http://cve.circl.lu/cve/CVE-2020-8184
Issue Tracking
https://bugs.php.net/bug.php?id=79699
and 10 more references
51
/ 100
high-risk
Severity
18/34 · Moderate
Exploitability
15/34 · Moderate
Exposure
18/34 · Moderate