First published: Tue Feb 16 2021(Updated: )
Failure to Sanitize host header value on output in the GateManager Web server could allow an attacker to conduct web cache poisoning attacks. This issue affects Secomea GateManager all versions prior to 9.3
Credit: VulnerabilityReporting@secomea.com
Affected Software | Affected Version | How to fix |
---|---|---|
Secomea Gatemanager 4250 Firmware | ||
Secomea GateManager | ||
Secomea Gatemanager | ||
Secomea GateManager | ||
Secomea GateManager | ||
Secomea GateManager | ||
Secomea Gatemanager 8250 Firmware | <9.3 | |
Secomea Gatemanager 8250 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-29022 is a vulnerability that allows an attacker to conduct web cache poisoning attacks by exploiting the failure to sanitize the host header value on output in the GateManager Web server.
CVE-2020-29022 affects Secomea GateManager versions prior to 9.3.
CVE-2020-29022 has a severity rating of 5.3, which is considered medium.
An attacker can exploit CVE-2020-29022 by manipulating the host header value to conduct web cache poisoning attacks.
Yes, Secomea has released a fix for CVE-2020-29022. It is recommended to update to GateManager version 9.3 or later to mitigate this vulnerability.