7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
microsoft.aspnetcore.http and microsoft.owin are vulnerable to authorization bypass. Cookie values are not properly decoded when it contain certain characters. A remote attacker is able to bypass the “Cookie Prefixes” security mechanism by sending malicious cookies to the application.
access.redhat.com/errata/RHSA-2020:3697
access.redhat.com/errata/RHSA-2020:3699
github.com/aspnet/AspNetKatana/commit/535ab4ccc4ddf6650517e76712c888c3d920bd8b
github.com/aspnet/AspNetKatana/pull/368
github.com/dotnet/aspnetcore/commit/1eaaf15f2b15df1dc7327ab46558b652dd5bce7d
github.com/dotnet/aspnetcore/issues/23578
github.com/dotnet/aspnetcore/issues/25701
github.com/dotnet/aspnetcore/pull/24264
github.com/dotnet/core/blob/main/release-notes/3.1/3.1.8/3.1.8.md#changes-in-318
lists.fedoraproject.org/archives/list/[email protected]/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB/
lists.fedoraproject.org/archives/list/[email protected]/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3/
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N