Lucene search

K
githubGitHub Advisory DatabaseGHSA-PX8H-6QXV-M22Q
HistoryFeb 15, 2023 - 3:37 p.m.

Incorrect parsing of nameless cookies leads to __Host- cookies bypass

2023-02-1515:37:03
CWE-20
GitHub Advisory Database
github.com
91

0.001 Low

EPSS

Percentile

18.7%

Browsers may allow “nameless” cookies that look like =value instead of key=value. A vulnerable browser may allow a compromised application on an adjacent subdomain to exploit this to set a cookie like =__Host-test=bad for another subdomain.

Werkzeug <= 2.2.2 will parse the cookie =__Host-test=bad as __Host-test=bad. If a Werkzeug application is running next to a vulnerable or malicious subdomain which sets such a cookie using a vulnerable browser, the Werkzeug application will see the bad cookie value but the valid cookie key.

CPENameOperatorVersion
werkzeuglt2.2.3