First published: Wed Sep 28 2022(Updated: )
Fixed bug GHSA-wpj3-hf5j-x4v4 (__Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix). (CVE-2024-2756)
Credit: security@php.net security@php.net security@php.net
Affected Software | Affected Version | How to fix |
---|---|---|
PHP PHP | <7.4.31 | |
PHP PHP | >=8.0.0<8.0.24 | |
PHP PHP | >=8.1.0<8.1.11 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
PHP PHP | <8.1.28 | 8.1.28 |
debian/php7.4 | 7.4.33-1+deb11u5 7.4.33-1+deb11u6 |
Upgrade to PHP 7.4.31, 8.0.24, or 8.1.11.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31629 is a vulnerability in PHP versions before 7.4.31, 8.0.24, and 8.1.11 that enables network and same-site attackers to set an insecure cookie in the victim's browser.
CVE-2022-31629 affects PHP versions before 7.4.31, 8.0.24, and 8.1.11 by allowing attackers to set a standard insecure cookie in the victim's browser.
To fix CVE-2022-31629 in PHP, update to version 7.4.32, 7.3.31-1~deb10u4, or 7.4.33-1+deb11u3 (or later versions).
CVE-2022-31629 allows network and same-site attackers to set a standard insecure cookie in the victim's browser, which is treated as a `__Host-` or `__Secure-` cookie by PHP applications.
You can find more information about CVE-2022-31629 at the following references: [Link 1](https://www.php.net/ChangeLog-7.php#7.4.32), [Link 2](https://bugs.php.net/bug.php?id=81727), [Link 3](https://github.com/php/php-src/commit/0611be4e82887cee0de6c4cbae320d34eec946ca)