High severityNVD Advisory· Published Sep 11, 2020· Updated Nov 18, 2024
Microsoft ASP.NET Core Security Feature Bypass Vulnerability
CVE-2020-1045
Description
<p>A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.</p> <p>The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.</p> <p>The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names.</p>
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
Microsoft.AspNetCore.HttpNuGet | < 2.1.22 | 2.1.22 |
Microsoft.AspNetCore.AppNuGet | < 2.1.22 | 2.1.22 |
Microsoft.OwinNuGet | < 4.1.1 | 4.1.1 |
Microsoft.AspNetCore.App.Runtime.linux-armNuGet | >= 3.1.0, < 3.1.8 | 3.1.8 |
Microsoft.AspNetCore.App.Runtime.linux-arm64NuGet | >= 3.1.0, < 3.1.8 | 3.1.8 |
Microsoft.AspNetCore.App.Runtime.linux-musl-x64NuGet | >= 3.1.0, < 3.1.8 | 3.1.8 |
Microsoft.AspNetCore.App.Runtime.linux-x64NuGet | >= 3.1.0, < 3.1.8 | 3.1.8 |
Microsoft.AspNetCore.App.Runtime.osx-x64NuGet | >= 3.1.0, < 3.1.8 | 3.1.8 |
Microsoft.AspNetCore.App.Runtime.win-armNuGet | >= 3.1.0, < 3.1.8 | 3.1.8 |
Microsoft.AspNetCore.App.Runtime.win-x64NuGet | >= 3.1.0, < 3.1.8 | 3.1.8 |
Microsoft.AspNetCore.App.Runtime.win-x86NuGet | >= 3.1.0, < 3.1.8 | 3.1.8 |
Microsoft.AspNetCore.App.Runtime.linux-musl-arm64NuGet | >= 3.1.0, < 3.1.8 | 3.1.8 |
Microsoft.AspNetCore.App.Runtime.win-arm64NuGet | >= 3.1.5, < 3.1.8 | 3.1.8 |
Affected products
2cpe:2.3:a:microsoft:asp.net_core:2.1*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:microsoft:asp.net_core:2.1*:*:*:*:*:*:*:*range: 2.0
- cpe:2.3:a:microsoft:asp.net_core:3.1:*:*:*:*:*:*:*range: 3.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
17- github.com/advisories/GHSA-hxrm-9w7p-39ccghsaADVISORY
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3/mitrevendor-advisory
- nvd.nist.gov/vuln/detail/CVE-2020-1045ghsaADVISORY
- access.redhat.com/errata/RHSA-2020:3699ghsaWEB
- github.com/dotnet/announcements/issues/165ghsaWEB
- github.com/dotnet/aspnetcore/issues/25701ghsaWEB
- github.com/dotnet/aspnetcore/issues/25701ghsaWEB
- github.com/dotnet/aspnetcore/pull/24264ghsaWEB
- github.com/dotnet/core/blob/main/release-notes/3.1/3.1.8/3.1.8.mdghsaWEB
- github.com/github/advisory-database/issues/302ghsaWEB
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPBghsaWEB
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3ghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPBghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3ghsaWEB
- portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045ghsaWEB
- security.snyk.io/vuln/SNYK-RHEL8-DOTNET-1439600ghsaWEB
News mentions
0No linked articles in our index yet.