First published: Thu Oct 01 2020(Updated: )
In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information.
Credit: security@php.net security@php.net
Affected Software | Affected Version | How to fix |
---|---|---|
debian/php7.3 | 7.3.31-1~deb10u1 7.3.31-1~deb10u5 | |
debian/php7.4 | 7.4.33-1+deb11u4 | |
ubuntu/php5 | <5.5.9+dfsg-1ubuntu4.29+ | 5.5.9+dfsg-1ubuntu4.29+ |
ubuntu/php7.0 | <7.0.33-0ubuntu0.16.04.16 | 7.0.33-0ubuntu0.16.04.16 |
ubuntu/php7.2 | <7.2.24-0ubuntu0.18.04.7 | 7.2.24-0ubuntu0.18.04.7 |
ubuntu/php7.4 | <7.4.3-4ubuntu2.4 | 7.4.3-4ubuntu2.4 |
ubuntu/php7.4 | <7.4.9-1ubuntu1.1 | 7.4.9-1ubuntu1.1 |
PHP PHP | >=7.2.0<7.2.34 | |
PHP PHP | >=7.3.0<7.3.23 | |
PHP PHP | >=7.4.0<7.4.11 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 | |
NetApp Clustered Data ONTAP | ||
Tenable Tenable.sc | <5.19.0 | |
<7.2.34 | 7.2.34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-7070.
The title of the vulnerability is 'Fixed bug (PHP parses encoded cookie names so malicious `__Host-` cookies can be sent).
The severity of CVE-2020-7070 is medium with a severity value of 5.3.
PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23, and 7.4.x below 7.4.11 are affected by CVE-2020-7070.
To fix CVE-2020-7070, update PHP to version 7.2.34, 7.3.23, or 7.4.11.