First published: Fri Aug 28 2020(Updated: )
<p>A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.</p> <p>The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.</p> <p>The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names.</p>
Credit: secure@microsoft.com secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
nuget/Microsoft.AspNetCore.Http | <2.1.22 | 2.1.22 |
nuget/Microsoft.AspNetCore.App.Runtime.win-arm64 | >=3.1.5<3.1.8 | 3.1.8 |
nuget/Microsoft.AspNetCore.App.Runtime.win-x86 | >=3.1.0<3.1.8 | 3.1.8 |
nuget/Microsoft.AspNetCore.App.Runtime.win-x64 | >=3.1.0<3.1.8 | 3.1.8 |
nuget/Microsoft.AspNetCore.App.Runtime.win-arm | >=3.1.0<3.1.8 | 3.1.8 |
nuget/Microsoft.AspNetCore.App.Runtime.osx-x64 | >=3.1.0<3.1.8 | 3.1.8 |
nuget/Microsoft.AspNetCore.App.Runtime.linux-x64 | >=3.1.0<3.1.8 | 3.1.8 |
nuget/Microsoft.AspNetCore.App.Runtime.linux-musl-x64 | >=3.1.0<3.1.8 | 3.1.8 |
nuget/Microsoft.AspNetCore.App.Runtime.linux-musl-arm64 | >=3.1.0<3.1.8 | 3.1.8 |
nuget/Microsoft.AspNetCore.App.Runtime.linux-arm64 | >=3.1.0<3.1.8 | 3.1.8 |
nuget/Microsoft.AspNetCore.App.Runtime.linux-arm | >=3.1.0<3.1.8 | 3.1.8 |
nuget/Microsoft.Owin | <4.1.1 | 4.1.1 |
nuget/Microsoft.AspNetCore.App | <=2.1.21 | 2.1.22 |
Microsoft ASP.NET Core | >=2.1<=2.1.21 | |
Microsoft ASP.NET Core | >=3.1<3.1.8 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux Aus | =8.2 | |
Redhat Enterprise Linux Aus | =8.4 | |
Redhat Enterprise Linux Aus | =8.6 | |
Redhat Enterprise Linux Eus | =8.2 | |
Redhat Enterprise Linux Eus | =8.4 | |
Redhat Enterprise Linux Eus | =8.6 | |
Redhat Enterprise Linux Tus | =8.2 | |
Redhat Enterprise Linux Tus | =8.4 | |
Redhat Enterprise Linux Tus | =8.6 | |
>=2.1<=2.1.21 | ||
>=3.1<3.1.8 | ||
=32 | ||
=33 | ||
=8.0 | ||
=8.2 | ||
=8.4 | ||
=8.6 | ||
=8.2 | ||
=8.4 | ||
=8.6 | ||
=8.2 | ||
=8.4 | ||
=8.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1045 is a security feature bypass vulnerability in Microsoft ASP.NET Core.
The severity of CVE-2020-1045 is high (7.5).
Microsoft ASP.NET Core versions 2.1.21 to 2.1 and 3.1.8 to 3.1 are affected by CVE-2020-1045.
CVE-2020-1045 allows a malicious attacker to set a second cookie with a percent-encoded name by exploiting how ASP.NET Core parses encoded cookie names.
Update to the patched versions of Microsoft ASP.NET Core (2.1.21 or later for 2.1.x versions, 3.1.8 or later for 3.1.x versions).