First published: Tue Sep 29 2020(Updated: )
Fixed bug (PHP parses encoded cookie names so malicious `__Host-` cookies can be sent). (CVE-2020-7070)
Credit: security@php.net security@php.net
Affected Software | Affected Version | How to fix |
---|---|---|
PHP PHP | >=7.2.0<7.2.34 | |
PHP PHP | >=7.3.0<7.3.23 | |
PHP PHP | >=7.4.0<7.4.11 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 | |
NetApp Clustered Data ONTAP | ||
Tenable Tenable.sc | <5.19.0 | |
PHP PHP | <7.2.34 | 7.2.34 |
debian/php7.4 | 7.4.33-1+deb11u5 7.4.33-1+deb11u7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-7070.
The title of the vulnerability is 'Fixed bug (PHP parses encoded cookie names so malicious `__Host-` cookies can be sent).
The severity of CVE-2020-7070 is medium with a severity value of 5.3.
PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23, and 7.4.x below 7.4.11 are affected by CVE-2020-7070.
To fix CVE-2020-7070, update PHP to version 7.2.34, 7.3.23, or 7.4.11.