Lucene search

K
nvd[email protected]NVD:CVE-2020-1045
HistorySep 11, 2020 - 5:15 p.m.

CVE-2020-1045

2020-09-1117:15:18
web.nvd.nist.gov
8
microsoft
asp.net core
security bypass
cookie parser
vulnerability

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

EPSS

0.004

Percentile

73.0%

<p>A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.</p>
<p>The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.</p>
<p>The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names.</p>

Affected configurations

Nvd
Node
microsoftasp.net_coreRange2.12.1.21
OR
microsoftasp.net_coreRange3.13.1.8
Node
fedoraprojectfedoraMatch32
OR
fedoraprojectfedoraMatch33
Node
redhatenterprise_linuxMatch8.0
OR
redhatenterprise_linux_ausMatch8.2
OR
redhatenterprise_linux_ausMatch8.4
OR
redhatenterprise_linux_ausMatch8.6
OR
redhatenterprise_linux_eusMatch8.2
OR
redhatenterprise_linux_eusMatch8.4
OR
redhatenterprise_linux_eusMatch8.6
OR
redhatenterprise_linux_tusMatch8.2
OR
redhatenterprise_linux_tusMatch8.4
OR
redhatenterprise_linux_tusMatch8.6
VendorProductVersionCPE
microsoftasp.net_core*cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*
fedoraprojectfedora32cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
fedoraprojectfedora33cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
redhatenterprise_linux8.0cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
redhatenterprise_linux_aus8.2cpe:2.3:o:redhat:enterprise_linux_aus:8.2:*:*:*:*:*:*:*
redhatenterprise_linux_aus8.4cpe:2.3:o:redhat:enterprise_linux_aus:8.4:*:*:*:*:*:*:*
redhatenterprise_linux_aus8.6cpe:2.3:o:redhat:enterprise_linux_aus:8.6:*:*:*:*:*:*:*
redhatenterprise_linux_eus8.2cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
redhatenterprise_linux_eus8.4cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
redhatenterprise_linux_eus8.6cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
Rows per page:
1-10 of 131

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

EPSS

0.004

Percentile

73.0%