Action not permitted
Modal body text goes here.
cve-2020-1045
Vulnerability from cvelistv5
▼ | Vendor | Product |
---|---|---|
Microsoft | ASP.NET Core 2.1 | |
Microsoft | ASP.NET Core 3.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:25:01.041Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045" }, { "name": "FEDORA-2020-e2deb72e0f", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB/" }, { "name": "FEDORA-2020-48fa1ad65c", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/dotnet/core/blob/main/release-notes/3.1/3.1.8/3.1.8.md#changes-in-318" }, { "tags": [ "x_transferred" ], "url": "https://security.snyk.io/vuln/SNYK-RHEL8-DOTNET-1439600" }, { "tags": [ "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:3699" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-1045", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-10T18:21:43.315688Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-18T16:25:38.621Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:microsoft:asp.net_core:2.1*:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "ASP.NET Core 2.1", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:asp.net_core:3.1:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "ASP.NET Core 3.1", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "3.0", "versionType": "custom" } ] } ], "datePublic": "2020-09-08T07:00:00+00:00", "descriptions": [ { "lang": "en-US", "value": "\u003cp\u003eA security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.\u003c/p\u003e\n\u003cp\u003eThe ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.\u003c/p\u003e\n\u003cp\u003eThe security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names.\u003c/p\u003e\n" } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Security Feature Bypass", "lang": "en-US", "type": "Impact" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-31T21:34:37.415Z", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045" }, { "name": "FEDORA-2020-e2deb72e0f", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB/" }, { "name": "FEDORA-2020-48fa1ad65c", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3/" }, { "url": "https://github.com/dotnet/core/blob/main/release-notes/3.1/3.1.8/3.1.8.md#changes-in-318" }, { "url": "https://security.snyk.io/vuln/SNYK-RHEL8-DOTNET-1439600" }, { "url": "https://access.redhat.com/errata/RHSA-2020:3699" } ], "title": "Microsoft ASP.NET Core Security Feature Bypass Vulnerability" } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2020-1045", "datePublished": "2020-09-11T00:00:00", "dateReserved": "2019-11-04T00:00:00", "dateUpdated": "2024-11-18T16:25:38.621Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-1045\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2020-09-11T17:15:18.307\",\"lastModified\":\"2023-12-31T22:15:55.070\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"\u003cp\u003eA security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.\u003c/p\u003e\\n\u003cp\u003eThe ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.\u003c/p\u003e\\n\u003cp\u003eThe security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names.\u003c/p\u003e\\n\"},{\"lang\":\"es\",\"value\":\"Se presenta una vulnerabilidad de omisi\u00f3n de la caracter\u00edstica de seguridad en la manera en que Microsoft ASP.NET Core analiza los nombres de cookies codificados. El analizador de cookies de ASP.NET Core decodifica cadenas de cookies completas que podr\u00edan permitir a un atacante malicioso establecer una segunda cookie con el nombre codificado en porcentaje. La actualizaci\u00f3n de seguridad aborda la vulnerabilidad al corregir la manera en que el analizador de cookies ASP.NET Core maneja los nombres codificados, tambi\u00e9n se conoce como \\\"Microsoft ASP.NET Core Security Feature Bypass Vulnerability\\\"\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.1\",\"versionEndIncluding\":\"2.1.21\",\"matchCriteriaId\":\"A6237BE3-2B52-4E81-BEB4-AC370C79CD6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.1\",\"versionEndExcluding\":\"3.1.8\",\"matchCriteriaId\":\"30C25D29-DA72-404C-934E-7CCA3CCB8793\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D96259-24BD-44E2-96D9-78CE1D41F956\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_aus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7883DE07-470D-4160-9767-4F831B75B9A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_aus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D5F4FA7-E5C5-4C23-BDA8-36A36972E4F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_aus:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CA4F12A-5BC5-4D75-8F20-80D8BB2C5BF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"831F0F47-3565-4763-B16F-C87B1FF2035E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E3F09B5-569F-4C58-9FCA-3C0953D107B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C3741B8-851F-475D-B428-523F4F722350\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_tus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C24797C-0397-4D4F-ADC3-3B99095DBB35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_tus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF14A415-15BD-4A6C-87CF-675E09390474\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_tus:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C237415F-33FE-4686-9B19-A0916BF75D2D\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2020:3699\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/dotnet/core/blob/main/release-notes/3.1/3.1.8/3.1.8.md#changes-in-318\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB/\",\"source\":\"secure@microsoft.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3/\",\"source\":\"secure@microsoft.com\"},{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.snyk.io/vuln/SNYK-RHEL8-DOTNET-1439600\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
var-202009-0169
Vulnerability from variot
A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.
The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.
The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names.
. Both Microsoft .NET Core and Microsoft ASP.NET Core are products of Microsoft Corporation of the United States. .NET Core is a free open source development platform. The platform has features such as multi-language support and cross-platform. Microsoft ASP.NET Core is a cross-platform open source framework. The framework is used to build cloud-based applications such as web applications, IoT applications, and mobile backends. Attackers can use this vulnerability to set a second cookie. The following products and versions are affected: ASP.NET Core 2.1 version, ASP.NET Core 3.1 version. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: .NET Core 3.1 security and bugfix update for Red Hat Enterprise Linux Advisory ID: RHSA-2020:3697-01 Product: .NET Core on Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:3697 Issue date: 2020-09-08 CVE Names: CVE-2020-1045 ==================================================================== 1. Summary:
An update for rh-dotnet31-dotnet is now available for .NET Core on Red Hat Enterprise Linux.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 .NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64 .NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64
- It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Package List:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source: rh-dotnet31-dotnet-3.1.108-1.el7.src.rpm
x86_64: rh-dotnet31-aspnetcore-runtime-3.1-3.1.8-1.el7.x86_64.rpm rh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.8-1.el7.x86_64.rpm rh-dotnet31-dotnet-3.1.108-1.el7.x86_64.rpm rh-dotnet31-dotnet-apphost-pack-3.1-3.1.8-1.el7.x86_64.rpm rh-dotnet31-dotnet-debuginfo-3.1.108-1.el7.x86_64.rpm rh-dotnet31-dotnet-host-3.1.8-1.el7.x86_64.rpm rh-dotnet31-dotnet-hostfxr-3.1-3.1.8-1.el7.x86_64.rpm rh-dotnet31-dotnet-runtime-3.1-3.1.8-1.el7.x86_64.rpm rh-dotnet31-dotnet-sdk-3.1-3.1.108-1.el7.x86_64.rpm rh-dotnet31-dotnet-targeting-pack-3.1-3.1.8-1.el7.x86_64.rpm rh-dotnet31-dotnet-templates-3.1-3.1.108-1.el7.x86_64.rpm rh-dotnet31-netstandard-targeting-pack-2.1-3.1.108-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source: rh-dotnet31-dotnet-3.1.108-1.el7.src.rpm
x86_64: rh-dotnet31-aspnetcore-runtime-3.1-3.1.8-1.el7.x86_64.rpm rh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.8-1.el7.x86_64.rpm rh-dotnet31-dotnet-3.1.108-1.el7.x86_64.rpm rh-dotnet31-dotnet-apphost-pack-3.1-3.1.8-1.el7.x86_64.rpm rh-dotnet31-dotnet-debuginfo-3.1.108-1.el7.x86_64.rpm rh-dotnet31-dotnet-host-3.1.8-1.el7.x86_64.rpm rh-dotnet31-dotnet-hostfxr-3.1-3.1.8-1.el7.x86_64.rpm rh-dotnet31-dotnet-runtime-3.1-3.1.8-1.el7.x86_64.rpm rh-dotnet31-dotnet-sdk-3.1-3.1.108-1.el7.x86_64.rpm rh-dotnet31-dotnet-targeting-pack-3.1-3.1.8-1.el7.x86_64.rpm rh-dotnet31-dotnet-templates-3.1-3.1.108-1.el7.x86_64.rpm rh-dotnet31-netstandard-targeting-pack-2.1-3.1.108-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source: rh-dotnet31-dotnet-3.1.108-1.el7.src.rpm
x86_64: rh-dotnet31-aspnetcore-runtime-3.1-3.1.8-1.el7.x86_64.rpm rh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.8-1.el7.x86_64.rpm rh-dotnet31-dotnet-3.1.108-1.el7.x86_64.rpm rh-dotnet31-dotnet-apphost-pack-3.1-3.1.8-1.el7.x86_64.rpm rh-dotnet31-dotnet-debuginfo-3.1.108-1.el7.x86_64.rpm rh-dotnet31-dotnet-host-3.1.8-1.el7.x86_64.rpm rh-dotnet31-dotnet-hostfxr-3.1-3.1.8-1.el7.x86_64.rpm rh-dotnet31-dotnet-runtime-3.1-3.1.8-1.el7.x86_64.rpm rh-dotnet31-dotnet-sdk-3.1-3.1.108-1.el7.x86_64.rpm rh-dotnet31-dotnet-targeting-pack-3.1-3.1.8-1.el7.x86_64.rpm rh-dotnet31-dotnet-templates-3.1-3.1.108-1.el7.x86_64.rpm rh-dotnet31-netstandard-targeting-pack-2.1-3.1.108-1.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2020-1045 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBX1fMj9zjgjWX9erEAQh6wA/+NBE91/LaDoq9eYFxfrqVguYZ1Pmb0oBs B4B0pXCUloGDDFTLmFPyIXPwXt1oklGPJ7/UuA4A6Bn2pNNLCGCbP/sDRHOoqcoe NMWrC5z3f8eHU0A+OLZjCfUBHrkZl3FCgDqGW4h5un0TCfCA/x5RRq/3gp/QKYmq cIckR5jkQtw9HrAsUdhjNfnapqGOpryMj0BEy43p1sr3dWeR4vndaddjz7ghbddZ yt2igJzvQJzaY4f788dGqC07HzPL0ehEhqyvyyJtRK7Mg97q+rai5xyQuVS76y94 aogTKj8YI4r0FI0yhz5v+4Skr7osCSoodIucTEpYuB3i1A+ZLg+3hlSSogsryOUA jy46wqFivHPMggNXXKrE0usJNPZf3+7dpuSarNtm57SFKKCx18dAhWUkK0WjTYox aa9NEAT5+z7NSI8snTwVP7bVbTRGIZPZbWEzMcL4VGjo05iGm32UCj1tHJYUWEhS sZD7gSqAk/ieuRAYXAd9DStKFPmjf5lKe823L1Fjw6fIGHGXfjeAyhuvIArL1UJc K9IKEBrG9FoxXd/01jOrjvobbEeMbLnFo3mRSMd6n1/nBGNbp9cTbELzQzX13Vf8 /LNeD82fuk2reO7w430Zx0AJZH3kyjLB5zbtLtVwC8f2oOVYbGgJY4gcWTOgp5ej gKRtEISquJk=Nco9 -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202009-0169", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "enterprise linux aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.4" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.0" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "32" }, { "model": "asp.net core", "scope": "gte", "trust": 1.0, "vendor": "microsoft", "version": "2.1" }, { "model": "asp.net core", "scope": "lt", "trust": 1.0, "vendor": "microsoft", "version": "3.1.8" }, { "model": "asp.net core", "scope": "lte", "trust": 1.0, "vendor": "microsoft", "version": "2.1.21" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.4" }, { "model": "enterprise linux tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.4" }, { "model": "enterprise linux tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.6" }, { "model": "enterprise linux aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.6" }, { "model": "enterprise linux tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.2" }, { "model": "enterprise linux aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.2" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.6" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "33" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.2" }, { "model": "asp.net core", "scope": "gte", "trust": 1.0, "vendor": "microsoft", "version": "3.1" }, { "model": "asp.net core", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": null }, { "model": "asp.net core", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": "2.1" }, { "model": "asp.net core", "scope": "eq", "trust": 0.8, "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8", "version": "3.1" }, { "model": "asp.net core", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "2.1" }, { "model": "asp.net core", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "3.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-72702" }, { "db": "JVNDB", "id": "JVNDB-2020-009287" }, { "db": "NVD", "id": "CVE-2020-1045" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.1.21", "versionStartIncluding": "2.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.1.8", "versionStartIncluding": "3.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_aus:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_tus:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_aus:8.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_tus:8.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_tus:8.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_aus:8.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-1045" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Matt Langlois of Github Security Team", "sources": [ { "db": "CNNVD", "id": "CNNVD-202009-369" } ], "trust": 0.6 }, "cve": "CVE-2020-1045", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-1045", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-72702", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-1045", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-1045", "trust": 1.8, "value": "HIGH" }, { "author": "secure@microsoft.com", "id": "CVE-2020-1045", "trust": 1.0, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2020-72702", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202009-369", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2020-1045", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-72702" }, { "db": "VULMON", "id": "CVE-2020-1045" }, { "db": "JVNDB", "id": "JVNDB-2020-009287" }, { "db": "NVD", "id": "CVE-2020-1045" }, { "db": "NVD", "id": "CVE-2020-1045" }, { "db": "CNNVD", "id": "CNNVD-202009-369" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "\u003cp\u003eA security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.\u003c/p\u003e\n\u003cp\u003eThe ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.\u003c/p\u003e\n\u003cp\u003eThe security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names.\u003c/p\u003e\n. Both Microsoft .NET Core and Microsoft ASP.NET Core are products of Microsoft Corporation of the United States. .NET Core is a free open source development platform. The platform has features such as multi-language support and cross-platform. Microsoft ASP.NET Core is a cross-platform open source framework. The framework is used to build cloud-based applications such as web applications, IoT applications, and mobile backends. Attackers can use this vulnerability to set a second cookie. The following products and versions are affected: ASP.NET Core 2.1 version, ASP.NET Core 3.1 version. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: .NET Core 3.1 security and bugfix update for Red Hat Enterprise Linux\nAdvisory ID: RHSA-2020:3697-01\nProduct: .NET Core on Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2020:3697\nIssue date: 2020-09-08\nCVE Names: CVE-2020-1045\n====================================================================\n1. Summary:\n\nAn update for rh-dotnet31-dotnet is now available for .NET Core on Red Hat\nEnterprise Linux. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\n.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64\n.NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64\n.NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64\n\n3. It implements a subset of the\n.NET framework APIs and several new APIs, and it includes a CLR\nimplementation. \n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Package List:\n\n.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nrh-dotnet31-dotnet-3.1.108-1.el7.src.rpm\n\nx86_64:\nrh-dotnet31-aspnetcore-runtime-3.1-3.1.8-1.el7.x86_64.rpm\nrh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.8-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-3.1.108-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-apphost-pack-3.1-3.1.8-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-debuginfo-3.1.108-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-host-3.1.8-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-hostfxr-3.1-3.1.8-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-runtime-3.1-3.1.8-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-sdk-3.1-3.1.108-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-targeting-pack-3.1-3.1.8-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-templates-3.1-3.1.108-1.el7.x86_64.rpm\nrh-dotnet31-netstandard-targeting-pack-2.1-3.1.108-1.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux Server (v. 7):\n\nSource:\nrh-dotnet31-dotnet-3.1.108-1.el7.src.rpm\n\nx86_64:\nrh-dotnet31-aspnetcore-runtime-3.1-3.1.8-1.el7.x86_64.rpm\nrh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.8-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-3.1.108-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-apphost-pack-3.1-3.1.8-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-debuginfo-3.1.108-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-host-3.1.8-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-hostfxr-3.1-3.1.8-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-runtime-3.1-3.1.8-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-sdk-3.1-3.1.108-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-targeting-pack-3.1-3.1.8-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-templates-3.1-3.1.108-1.el7.x86_64.rpm\nrh-dotnet31-netstandard-targeting-pack-2.1-3.1.108-1.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nrh-dotnet31-dotnet-3.1.108-1.el7.src.rpm\n\nx86_64:\nrh-dotnet31-aspnetcore-runtime-3.1-3.1.8-1.el7.x86_64.rpm\nrh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.8-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-3.1.108-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-apphost-pack-3.1-3.1.8-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-debuginfo-3.1.108-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-host-3.1.8-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-hostfxr-3.1-3.1.8-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-runtime-3.1-3.1.8-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-sdk-3.1-3.1.108-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-targeting-pack-3.1-3.1.8-1.el7.x86_64.rpm\nrh-dotnet31-dotnet-templates-3.1-3.1.108-1.el7.x86_64.rpm\nrh-dotnet31-netstandard-targeting-pack-2.1-3.1.108-1.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-1045\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2020 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\ngKRtEISquJk=Nco9\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n", "sources": [ { "db": "NVD", "id": "CVE-2020-1045" }, { "db": "JVNDB", "id": "JVNDB-2020-009287" }, { "db": "CNVD", "id": "CNVD-2020-72702" }, { "db": "CNNVD", "id": "CNNVD-202009-369" }, { "db": "VULMON", "id": "CVE-2020-1045" }, { "db": "PACKETSTORM", "id": "159112" }, { "db": "PACKETSTORM", "id": "159113" } ], "trust": 2.97 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-1045", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2020-009287", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "159113", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2020-72702", "trust": 0.6 }, { "db": "NSFOCUS", "id": "49612", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3075", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202009-369", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2020-1045", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "159112", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-72702" }, { "db": "VULMON", "id": "CVE-2020-1045" }, { "db": "JVNDB", "id": "JVNDB-2020-009287" }, { "db": "PACKETSTORM", "id": "159112" }, { "db": "PACKETSTORM", "id": "159113" }, { "db": "NVD", "id": "CVE-2020-1045" }, { "db": "CNNVD", "id": "CNNVD-202009-369" } ] }, "id": "VAR-202009-0169", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-72702" } ], "trust": 0.81178882 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-72702" } ] }, "last_update_date": "2024-01-03T13:38:58.207000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2020-1045\u00a0|\u00a0Microsoft\u00a0ASP.NET\u00a0Core\u00a0Security\u00a0Feature\u00a0Bypass\u00a0Vulnerability Security Update Guide", "trust": 0.8, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2020-1045" }, { "title": "Microsoft .NET Core and ASP.NET Core security feature bypass vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/242194" }, { "title": "Microsoft .NET Core and Microsoft ASP.NET Core Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=127790" }, { "title": "Red Hat: Important: .NET Core 3.1 security and bugfix update for Red Hat Enterprise Linux", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20203697 - security advisory" }, { "title": "Red Hat: Important: .NET Core 3.1 security and bugfix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20203699 - security advisory" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-72702" }, { "db": "VULMON", "id": "CVE-2020-1045" }, { "db": "JVNDB", "id": "JVNDB-2020-009287" }, { "db": "CNNVD", "id": "CNNVD-202009-369" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-009287" }, { "db": "NVD", "id": "CVE-2020-1045" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2020-1045" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2020:3699" }, { "trust": 1.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-1045" }, { "trust": 1.6, "url": "https://github.com/dotnet/core/blob/main/release-notes/3.1/3.1.8/3.1.8.md#changes-in-318" }, { "trust": 1.6, "url": "https://security.snyk.io/vuln/snyk-rhel8-dotnet-1439600" }, { "trust": 1.2, "url": "https://portal.msrc.microsoft.com/zh-cn/security-guidance/advisory/cve-2020-1045" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ln2fuvbsvpgk7au3nmlo3yr6cgonqpb/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/asicxqxs4m7mtaf6sgqmclca63dlcut3/" }, { "trust": 0.8, "url": "https://www.ipa.go.jp/security/ciadr/vul/20200909-ms.html" }, { "trust": 0.8, "url": "https://www.jpcert.or.jp/at/2020/at200036.html" }, { "trust": 0.7, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5ln2fuvbsvpgk7au3nmlo3yr6cgonqpb/" }, { "trust": 0.7, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/asicxqxs4m7mtaf6sgqmclca63dlcut3/" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/49612" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/microsoft-asp-net-core-privilege-escalation-33271" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/159113/red-hat-security-advisory-2020-3699-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3075/" }, { "trust": 0.2, "url": "https://access.redhat.com/errata/rhsa-2020:3697" }, { "trust": 0.2, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.2, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.2, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-1045" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/187294" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-72702" }, { "db": "VULMON", "id": "CVE-2020-1045" }, { "db": "JVNDB", "id": "JVNDB-2020-009287" }, { "db": "PACKETSTORM", "id": "159112" }, { "db": "PACKETSTORM", "id": "159113" }, { "db": "NVD", "id": "CVE-2020-1045" }, { "db": "CNNVD", "id": "CNNVD-202009-369" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-72702" }, { "db": "VULMON", "id": "CVE-2020-1045" }, { "db": "JVNDB", "id": "JVNDB-2020-009287" }, { "db": "PACKETSTORM", "id": "159112" }, { "db": "PACKETSTORM", "id": "159113" }, { "db": "NVD", "id": "CVE-2020-1045" }, { "db": "CNNVD", "id": "CNNVD-202009-369" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-12-18T00:00:00", "db": "CNVD", "id": "CNVD-2020-72702" }, { "date": "2020-09-11T00:00:00", "db": "VULMON", "id": "CVE-2020-1045" }, { "date": "2020-10-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-009287" }, { "date": "2020-09-08T21:26:00", "db": "PACKETSTORM", "id": "159112" }, { "date": "2020-09-08T21:26:09", "db": "PACKETSTORM", "id": "159113" }, { "date": "2020-09-11T17:15:18.307000", "db": "NVD", "id": "CVE-2020-1045" }, { "date": "2020-09-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202009-369" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-12-18T00:00:00", "db": "CNVD", "id": "CNVD-2020-72702" }, { "date": "2020-10-02T00:00:00", "db": "VULMON", "id": "CVE-2020-1045" }, { "date": "2020-10-27T07:09:00", "db": "JVNDB", "id": "JVNDB-2020-009287" }, { "date": "2023-12-31T22:15:55.070000", "db": "NVD", "id": "CVE-2020-1045" }, { "date": "2022-11-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202009-369" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202009-369" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Microsoft\u00a0ASP.NET\u00a0Core\u00a0 Vulnerabilities that bypass security functions in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-009287" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202009-369" } ], "trust": 0.6 } }
ghsa-hxrm-9w7p-39cc
Vulnerability from github
A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names., aka 'Microsoft ASP.NET Core Security Feature Bypass Vulnerability'.
{ "affected": [ { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.Http" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.1.22" } ], "type": "ECOSYSTEM" } ] }, { "database_specific": { "last_known_affected_version_range": "\u003c= 2.1.21" }, "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.1.22" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.Owin" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "4.1.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.linux-arm" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.8" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.linux-arm64" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.8" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.linux-musl-x64" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.8" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.linux-x64" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.8" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.osx-x64" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.8" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.win-arm" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.8" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.win-x64" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.8" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.win-x86" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.8" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.linux-musl-arm64" }, "ranges": [ { "events": [ { "introduced": "3.1.0" }, { "fixed": "3.1.8" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.AspNetCore.App.Runtime.win-arm64" }, "ranges": [ { "events": [ { "introduced": "3.1.5" }, { "fixed": "3.1.8" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2020-1045" ], "database_specific": { "cwe_ids": [], "github_reviewed": true, "github_reviewed_at": "2022-07-07T23:06:40Z", "nvd_published_at": "2020-09-11T17:15:00Z", "severity": "HIGH" }, "details": "A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names., aka \u0027Microsoft ASP.NET Core Security Feature Bypass Vulnerability\u0027.", "id": "GHSA-hxrm-9w7p-39cc", "modified": "2022-07-07T23:06:40Z", "published": "2022-05-24T17:27:57Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1045" }, { "type": "WEB", "url": "https://github.com/dotnet/announcements/issues/165" }, { "type": "WEB", "url": "https://github.com/dotnet/aspnetcore/issues/25701" }, { "type": "WEB", "url": "https://github.com/dotnet/aspnetcore/issues/25701#issuecomment-689434477" }, { "type": "WEB", "url": "https://github.com/github/advisory-database/issues/302" }, { "type": "WEB", "url": "https://github.com/dotnet/aspnetcore/pull/24264" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2020:3699" }, { "type": "WEB", "url": "https://github.com/dotnet/core/blob/main/release-notes/3.1/3.1.8/3.1.8.md#changes-in-318" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3" }, { "type": "WEB", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045" }, { "type": "WEB", "url": "https://security.snyk.io/vuln/SNYK-RHEL8-DOTNET-1439600" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ], "summary": "Cookie parsing failure" }
rhsa-2020_3697
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-dotnet31-dotnet is now available for .NET Core on Red Hat Enterprise Linux.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": ".NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.\n\nNew versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 3.1.108 and .NET Core Runtime 3.1.8.\n\nSecurity Fix(es):\n\n* .NET Core: ASP.NET cookie prefix spoofing vulnerability (CVE-2020-1045)\n\nDefault inclusions for applications built with .NET Core have been updated to reference the newest versions and their security fixes.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3697", "url": "https://access.redhat.com/errata/RHSA-2020:3697" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1873451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873451" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3697.json" } ], "title": "Red Hat Security Advisory: .NET Core 3.1 security and bugfix update for Red Hat Enterprise Linux", "tracking": { "current_release_date": "2024-11-05T22:42:04+00:00", "generator": { "date": "2024-11-05T22:42:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2020:3697", "initial_release_date": "2020-09-08T18:25:36+00:00", "revision_history": [ { "date": "2020-09-08T18:25:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-09-08T18:25:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T22:42:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:3.1::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:3.1::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:3.1::el7" } } } ], "category": "product_family", "name": ".NET Core on Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.8-1.el7.x86_64", "product": { "name": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.8-1.el7.x86_64", "product_id": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.8-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-aspnetcore-runtime-3.1@3.1.8-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "product": { "name": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "product_id": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-aspnetcore-targeting-pack-3.1@3.1.8-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-0:3.1.108-1.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-0:3.1.108-1.el7.x86_64", "product_id": "rh-dotnet31-dotnet-0:3.1.108-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet@3.1.108-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.8-1.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.8-1.el7.x86_64", "product_id": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.8-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet-apphost-pack-3.1@3.1.8-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-host-0:3.1.8-1.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-host-0:3.1.8-1.el7.x86_64", "product_id": "rh-dotnet31-dotnet-host-0:3.1.8-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet-host@3.1.8-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.8-1.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.8-1.el7.x86_64", "product_id": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.8-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet-hostfxr-3.1@3.1.8-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.8-1.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.8-1.el7.x86_64", "product_id": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.8-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet-runtime-3.1@3.1.8-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.108-1.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.108-1.el7.x86_64", "product_id": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.108-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet-sdk-3.1@3.1.108-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "product_id": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet-targeting-pack-3.1@3.1.8-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-templates-3.1-0:3.1.108-1.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-templates-3.1-0:3.1.108-1.el7.x86_64", "product_id": "rh-dotnet31-dotnet-templates-3.1-0:3.1.108-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet-templates-3.1@3.1.108-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.108-1.el7.x86_64", "product": { "name": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.108-1.el7.x86_64", "product_id": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.108-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-netstandard-targeting-pack-2.1@3.1.108-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet31-dotnet-debuginfo-0:3.1.108-1.el7.x86_64", "product": { "name": "rh-dotnet31-dotnet-debuginfo-0:3.1.108-1.el7.x86_64", "product_id": "rh-dotnet31-dotnet-debuginfo-0:3.1.108-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet-debuginfo@3.1.108-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-dotnet31-dotnet-0:3.1.108-1.el7.src", "product": { "name": "rh-dotnet31-dotnet-0:3.1.108-1.el7.src", "product_id": "rh-dotnet31-dotnet-0:3.1.108-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet31-dotnet@3.1.108-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.8-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.8-1.el7.x86_64" }, "product_reference": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.8-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.8-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.8-1.el7.x86_64" }, "product_reference": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-0:3.1.108-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.108-1.el7.src" }, "product_reference": "rh-dotnet31-dotnet-0:3.1.108-1.el7.src", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-0:3.1.108-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.108-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-0:3.1.108-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.8-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.8-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.8-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-debuginfo-0:3.1.108-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.108-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-debuginfo-0:3.1.108-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-host-0:3.1.8-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.8-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-host-0:3.1.8-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.8-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.8-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.8-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.8-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.8-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.8-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.108-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.108-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.108-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.8-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.8-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-templates-3.1-0:3.1.108-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.108-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-templates-3.1-0:3.1.108-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.108-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.108-1.el7.x86_64" }, "product_reference": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.108-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.8-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.8-1.el7.x86_64" }, "product_reference": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.8-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.8-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.8-1.el7.x86_64" }, "product_reference": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-0:3.1.108-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.108-1.el7.src" }, "product_reference": "rh-dotnet31-dotnet-0:3.1.108-1.el7.src", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-0:3.1.108-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.108-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-0:3.1.108-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.8-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.8-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.8-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-debuginfo-0:3.1.108-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.108-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-debuginfo-0:3.1.108-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-host-0:3.1.8-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.8-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-host-0:3.1.8-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.8-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.8-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.8-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.8-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.8-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.8-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.108-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.108-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.108-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.8-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.8-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-templates-3.1-0:3.1.108-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.108-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-templates-3.1-0:3.1.108-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.108-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.108-1.el7.x86_64" }, "product_reference": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.108-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.8-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.8-1.el7.x86_64" }, "product_reference": "rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.8-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.8-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.8-1.el7.x86_64" }, "product_reference": "rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-0:3.1.108-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.108-1.el7.src" }, "product_reference": "rh-dotnet31-dotnet-0:3.1.108-1.el7.src", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-0:3.1.108-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.108-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-0:3.1.108-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.8-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.8-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.8-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-debuginfo-0:3.1.108-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.108-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-debuginfo-0:3.1.108-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-host-0:3.1.8-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.8-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-host-0:3.1.8-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.8-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.8-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.8-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.8-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.8-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-runtime-3.1-0:3.1.8-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.108-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.108-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-sdk-3.1-0:3.1.108-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.8-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.8-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-dotnet-templates-3.1-0:3.1.108-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.108-1.el7.x86_64" }, "product_reference": "rh-dotnet31-dotnet-templates-3.1-0:3.1.108-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.108-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.108-1.el7.x86_64" }, "product_reference": "rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.108-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-3.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-1045", "cwe": { "id": "CWE-807", "name": "Reliance on Untrusted Inputs in a Security Decision" }, "discovery_date": "2020-08-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1873451" } ], "notes": [ { "category": "description", "text": "A flaw was found in ASP.NET. Certain cookie values are not properly decoded allowing a remote attacker to bypass the \"Cookie Prefixes\" security mechanism. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dotnet: ASP.NET cookie prefix spoofing vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "The \"Cookie Prefixes\" feature is not used by default in ASP.NET. Successful exploitation likely requires a secondary vulnerability, for example a cross-site scripting issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.8-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.108-1.el7.src", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.108-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.8-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.108-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.8-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.8-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.8-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.108-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.108-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.108-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.8-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.108-1.el7.src", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.108-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.8-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.108-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.8-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.8-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.8-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.108-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.108-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.108-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.8-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.108-1.el7.src", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.108-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.8-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.108-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.8-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.8-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.8-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.108-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.108-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.108-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1045" }, { "category": "external", "summary": "RHBZ#1873451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873451" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1045", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1045" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1045", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1045" }, { "category": "external", "summary": "https://github.com/dotnet/aspnetcore/issues/23578", "url": "https://github.com/dotnet/aspnetcore/issues/23578" }, { "category": "external", "summary": "https://github.com/dotnet/aspnetcore/pull/24264", "url": "https://github.com/dotnet/aspnetcore/pull/24264" }, { "category": "external", "summary": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045" } ], "release_date": "2020-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-09-08T18:25:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.8-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.108-1.el7.src", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.108-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.8-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.108-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.8-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.8-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.8-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.108-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.108-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.108-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.8-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.108-1.el7.src", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.108-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.8-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.108-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.8-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.8-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.8-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.108-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.108-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.108-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.8-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.108-1.el7.src", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.108-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.8-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.108-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.8-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.8-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.8-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.108-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.108-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.108-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3697" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.8-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.108-1.el7.src", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.108-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.8-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.108-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.8-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.8-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.8-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.108-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.108-1.el7.x86_64", "7ComputeNode-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.108-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.8-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.108-1.el7.src", "7Server-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.108-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.8-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.108-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.8-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.8-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.8-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.108-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.108-1.el7.x86_64", "7Server-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.108-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-runtime-3.1-0:3.1.8-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-aspnetcore-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.108-1.el7.src", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-0:3.1.108-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-apphost-pack-3.1-0:3.1.8-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-debuginfo-0:3.1.108-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-host-0:3.1.8-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-hostfxr-3.1-0:3.1.8-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-runtime-3.1-0:3.1.8-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-sdk-3.1-0:3.1.108-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-targeting-pack-3.1-0:3.1.8-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-dotnet-templates-3.1-0:3.1.108-1.el7.x86_64", "7Workstation-dotNET-3.1:rh-dotnet31-netstandard-targeting-pack-2.1-0:3.1.108-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dotnet: ASP.NET cookie prefix spoofing vulnerability" } ] }
rhsa-2020_3699
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for .NET Core 3.1 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": ".NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.\n\nNew versions of .NET Core that address security vulnerabilities are now available. The updated versions are .NET Core SDK 3.1.108 and .NET Core Runtime 3.1.8.\n\nSecurity Fixes:\n\n* .NET Core: ASP.NET cookie prefix spoofing vulnerability (CVE-2020-1045)\n\nDefault inclusions for applications built with .NET Core have been updated to reference the newest versions and their security fixes.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3699", "url": "https://access.redhat.com/errata/RHSA-2020:3699" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1873451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873451" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3699.json" } ], "title": "Red Hat Security Advisory: .NET Core 3.1 security and bugfix update", "tracking": { "current_release_date": "2024-11-05T22:41:57+00:00", "generator": { "date": "2024-11-05T22:41:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2020:3699", "initial_release_date": "2020-09-08T19:04:18+00:00", "revision_history": [ { "date": "2020-09-08T19:04:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-09-08T19:04:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T22:41:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "aspnetcore-runtime-3.1-0:3.1.8-2.el8_2.x86_64", "product": { "name": "aspnetcore-runtime-3.1-0:3.1.8-2.el8_2.x86_64", "product_id": "aspnetcore-runtime-3.1-0:3.1.8-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/aspnetcore-runtime-3.1@3.1.8-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "aspnetcore-targeting-pack-3.1-0:3.1.8-2.el8_2.x86_64", "product": { "name": "aspnetcore-targeting-pack-3.1-0:3.1.8-2.el8_2.x86_64", "product_id": "aspnetcore-targeting-pack-3.1-0:3.1.8-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/aspnetcore-targeting-pack-3.1@3.1.8-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-0:3.1.108-2.el8_2.x86_64", "product": { "name": "dotnet-0:3.1.108-2.el8_2.x86_64", "product_id": "dotnet-0:3.1.108-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet@3.1.108-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-apphost-pack-3.1-0:3.1.8-2.el8_2.x86_64", "product": { "name": "dotnet-apphost-pack-3.1-0:3.1.8-2.el8_2.x86_64", "product_id": "dotnet-apphost-pack-3.1-0:3.1.8-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-apphost-pack-3.1@3.1.8-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-host-0:3.1.8-2.el8_2.x86_64", "product": { "name": "dotnet-host-0:3.1.8-2.el8_2.x86_64", "product_id": "dotnet-host-0:3.1.8-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-host@3.1.8-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-hostfxr-3.1-0:3.1.8-2.el8_2.x86_64", "product": { "name": "dotnet-hostfxr-3.1-0:3.1.8-2.el8_2.x86_64", "product_id": "dotnet-hostfxr-3.1-0:3.1.8-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-hostfxr-3.1@3.1.8-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-runtime-3.1-0:3.1.8-2.el8_2.x86_64", "product": { "name": "dotnet-runtime-3.1-0:3.1.8-2.el8_2.x86_64", "product_id": "dotnet-runtime-3.1-0:3.1.8-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-runtime-3.1@3.1.8-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-sdk-3.1-0:3.1.108-2.el8_2.x86_64", "product": { "name": "dotnet-sdk-3.1-0:3.1.108-2.el8_2.x86_64", "product_id": "dotnet-sdk-3.1-0:3.1.108-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-sdk-3.1@3.1.108-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-targeting-pack-3.1-0:3.1.8-2.el8_2.x86_64", "product": { "name": "dotnet-targeting-pack-3.1-0:3.1.8-2.el8_2.x86_64", "product_id": "dotnet-targeting-pack-3.1-0:3.1.8-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-targeting-pack-3.1@3.1.8-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-templates-3.1-0:3.1.108-2.el8_2.x86_64", "product": { "name": "dotnet-templates-3.1-0:3.1.108-2.el8_2.x86_64", "product_id": "dotnet-templates-3.1-0:3.1.108-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-templates-3.1@3.1.108-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "netstandard-targeting-pack-2.1-0:3.1.108-2.el8_2.x86_64", "product": { "name": "netstandard-targeting-pack-2.1-0:3.1.108-2.el8_2.x86_64", "product_id": "netstandard-targeting-pack-2.1-0:3.1.108-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netstandard-targeting-pack-2.1@3.1.108-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet3.1-debugsource-0:3.1.108-2.el8_2.x86_64", "product": { "name": "dotnet3.1-debugsource-0:3.1.108-2.el8_2.x86_64", "product_id": "dotnet3.1-debugsource-0:3.1.108-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet3.1-debugsource@3.1.108-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-apphost-pack-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64", "product": { "name": "dotnet-apphost-pack-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64", "product_id": "dotnet-apphost-pack-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-apphost-pack-3.1-debuginfo@3.1.8-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-host-debuginfo-0:3.1.8-2.el8_2.x86_64", "product": { "name": "dotnet-host-debuginfo-0:3.1.8-2.el8_2.x86_64", "product_id": "dotnet-host-debuginfo-0:3.1.8-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-host-debuginfo@3.1.8-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-hostfxr-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64", "product": { "name": "dotnet-hostfxr-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64", "product_id": "dotnet-hostfxr-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-hostfxr-3.1-debuginfo@3.1.8-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-runtime-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64", "product": { "name": "dotnet-runtime-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64", "product_id": "dotnet-runtime-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-runtime-3.1-debuginfo@3.1.8-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet-sdk-3.1-debuginfo-0:3.1.108-2.el8_2.x86_64", "product": { "name": "dotnet-sdk-3.1-debuginfo-0:3.1.108-2.el8_2.x86_64", "product_id": "dotnet-sdk-3.1-debuginfo-0:3.1.108-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet-sdk-3.1-debuginfo@3.1.108-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "dotnet3.1-debuginfo-0:3.1.108-2.el8_2.x86_64", "product": { "name": "dotnet3.1-debuginfo-0:3.1.108-2.el8_2.x86_64", "product_id": "dotnet3.1-debuginfo-0:3.1.108-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet3.1-debuginfo@3.1.108-2.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dotnet3.1-0:3.1.108-2.el8_2.src", "product": { "name": "dotnet3.1-0:3.1.108-2.el8_2.src", "product_id": "dotnet3.1-0:3.1.108-2.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dotnet3.1@3.1.108-2.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "aspnetcore-runtime-3.1-0:3.1.8-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:aspnetcore-runtime-3.1-0:3.1.8-2.el8_2.x86_64" }, "product_reference": "aspnetcore-runtime-3.1-0:3.1.8-2.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "aspnetcore-targeting-pack-3.1-0:3.1.8-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-3.1-0:3.1.8-2.el8_2.x86_64" }, "product_reference": "aspnetcore-targeting-pack-3.1-0:3.1.8-2.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-0:3.1.108-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:dotnet-0:3.1.108-2.el8_2.x86_64" }, "product_reference": "dotnet-0:3.1.108-2.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-apphost-pack-3.1-0:3.1.8-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:dotnet-apphost-pack-3.1-0:3.1.8-2.el8_2.x86_64" }, "product_reference": "dotnet-apphost-pack-3.1-0:3.1.8-2.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-apphost-pack-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:dotnet-apphost-pack-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64" }, "product_reference": "dotnet-apphost-pack-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-host-0:3.1.8-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:dotnet-host-0:3.1.8-2.el8_2.x86_64" }, "product_reference": "dotnet-host-0:3.1.8-2.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-host-debuginfo-0:3.1.8-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:3.1.8-2.el8_2.x86_64" }, "product_reference": "dotnet-host-debuginfo-0:3.1.8-2.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-hostfxr-3.1-0:3.1.8-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:dotnet-hostfxr-3.1-0:3.1.8-2.el8_2.x86_64" }, "product_reference": "dotnet-hostfxr-3.1-0:3.1.8-2.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-hostfxr-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:dotnet-hostfxr-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64" }, "product_reference": "dotnet-hostfxr-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-runtime-3.1-0:3.1.8-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:dotnet-runtime-3.1-0:3.1.8-2.el8_2.x86_64" }, "product_reference": "dotnet-runtime-3.1-0:3.1.8-2.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-runtime-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:dotnet-runtime-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64" }, "product_reference": "dotnet-runtime-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-sdk-3.1-0:3.1.108-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:dotnet-sdk-3.1-0:3.1.108-2.el8_2.x86_64" }, "product_reference": "dotnet-sdk-3.1-0:3.1.108-2.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-sdk-3.1-debuginfo-0:3.1.108-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:dotnet-sdk-3.1-debuginfo-0:3.1.108-2.el8_2.x86_64" }, "product_reference": "dotnet-sdk-3.1-debuginfo-0:3.1.108-2.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-targeting-pack-3.1-0:3.1.8-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:dotnet-targeting-pack-3.1-0:3.1.8-2.el8_2.x86_64" }, "product_reference": "dotnet-targeting-pack-3.1-0:3.1.8-2.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet-templates-3.1-0:3.1.108-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:dotnet-templates-3.1-0:3.1.108-2.el8_2.x86_64" }, "product_reference": "dotnet-templates-3.1-0:3.1.108-2.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet3.1-0:3.1.108-2.el8_2.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:dotnet3.1-0:3.1.108-2.el8_2.src" }, "product_reference": "dotnet3.1-0:3.1.108-2.el8_2.src", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet3.1-debuginfo-0:3.1.108-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:dotnet3.1-debuginfo-0:3.1.108-2.el8_2.x86_64" }, "product_reference": "dotnet3.1-debuginfo-0:3.1.108-2.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "dotnet3.1-debugsource-0:3.1.108-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:dotnet3.1-debugsource-0:3.1.108-2.el8_2.x86_64" }, "product_reference": "dotnet3.1-debugsource-0:3.1.108-2.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "netstandard-targeting-pack-2.1-0:3.1.108-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:3.1.108-2.el8_2.x86_64" }, "product_reference": "netstandard-targeting-pack-2.1-0:3.1.108-2.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-1045", "cwe": { "id": "CWE-807", "name": "Reliance on Untrusted Inputs in a Security Decision" }, "discovery_date": "2020-08-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1873451" } ], "notes": [ { "category": "description", "text": "A flaw was found in ASP.NET. Certain cookie values are not properly decoded allowing a remote attacker to bypass the \"Cookie Prefixes\" security mechanism. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "dotnet: ASP.NET cookie prefix spoofing vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "The \"Cookie Prefixes\" feature is not used by default in ASP.NET. Successful exploitation likely requires a secondary vulnerability, for example a cross-site scripting issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:aspnetcore-runtime-3.1-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-3.1-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-0:3.1.108-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-apphost-pack-3.1-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-apphost-pack-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-host-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-hostfxr-3.1-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-hostfxr-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-runtime-3.1-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-runtime-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-sdk-3.1-0:3.1.108-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-sdk-3.1-debuginfo-0:3.1.108-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-targeting-pack-3.1-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-templates-3.1-0:3.1.108-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet3.1-0:3.1.108-2.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:dotnet3.1-debuginfo-0:3.1.108-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet3.1-debugsource-0:3.1.108-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:3.1.108-2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1045" }, { "category": "external", "summary": "RHBZ#1873451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873451" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1045", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1045" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1045", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1045" }, { "category": "external", "summary": "https://github.com/dotnet/aspnetcore/issues/23578", "url": "https://github.com/dotnet/aspnetcore/issues/23578" }, { "category": "external", "summary": "https://github.com/dotnet/aspnetcore/pull/24264", "url": "https://github.com/dotnet/aspnetcore/pull/24264" }, { "category": "external", "summary": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045" } ], "release_date": "2020-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-09-08T19:04:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:aspnetcore-runtime-3.1-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-3.1-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-0:3.1.108-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-apphost-pack-3.1-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-apphost-pack-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-host-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-hostfxr-3.1-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-hostfxr-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-runtime-3.1-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-runtime-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-sdk-3.1-0:3.1.108-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-sdk-3.1-debuginfo-0:3.1.108-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-targeting-pack-3.1-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-templates-3.1-0:3.1.108-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet3.1-0:3.1.108-2.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:dotnet3.1-debuginfo-0:3.1.108-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet3.1-debugsource-0:3.1.108-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:3.1.108-2.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3699" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:aspnetcore-runtime-3.1-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:aspnetcore-targeting-pack-3.1-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-0:3.1.108-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-apphost-pack-3.1-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-apphost-pack-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-host-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-host-debuginfo-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-hostfxr-3.1-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-hostfxr-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-runtime-3.1-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-runtime-3.1-debuginfo-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-sdk-3.1-0:3.1.108-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-sdk-3.1-debuginfo-0:3.1.108-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-targeting-pack-3.1-0:3.1.8-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet-templates-3.1-0:3.1.108-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet3.1-0:3.1.108-2.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:dotnet3.1-debuginfo-0:3.1.108-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:dotnet3.1-debugsource-0:3.1.108-2.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:netstandard-targeting-pack-2.1-0:3.1.108-2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dotnet: ASP.NET cookie prefix spoofing vulnerability" } ] }
gsd-2020-1045
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2020-1045", "description": "A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names., aka \u0027Microsoft ASP.NET Core Security Feature Bypass Vulnerability\u0027.", "id": "GSD-2020-1045", "references": [ "https://access.redhat.com/errata/RHSA-2020:3699", "https://access.redhat.com/errata/RHSA-2020:3697", "https://linux.oracle.com/cve/CVE-2020-1045.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-1045" ], "details": "A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names., aka \u0027Microsoft ASP.NET Core Security Feature Bypass Vulnerability\u0027.", "id": "GSD-2020-1045", "modified": "2023-12-13T01:21:57.661467Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2020-1045", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ASP.NET Core 2.1", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "2.0", "version_value": "publication" } ] } }, { "product_name": "ASP.NET Core 3.1", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "3.0", "version_value": "publication" } ] } } ] }, "vendor_name": "Microsoft" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "\u003cp\u003eA security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.\u003c/p\u003e\n\u003cp\u003eThe ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.\u003c/p\u003e\n\u003cp\u003eThe security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names.\u003c/p\u003e\n" } ] }, "impact": { "cvss": [ { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Security Feature Bypass" } ] } ] }, "references": { "reference_data": [ { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045", "refsource": "MISC", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3/" }, { "name": "https://github.com/dotnet/core/blob/main/release-notes/3.1/3.1.8/3.1.8.md#changes-in-318", "refsource": "MISC", "url": "https://github.com/dotnet/core/blob/main/release-notes/3.1/3.1.8/3.1.8.md#changes-in-318" }, { "name": "https://security.snyk.io/vuln/SNYK-RHEL8-DOTNET-1439600", "refsource": "MISC", "url": "https://security.snyk.io/vuln/SNYK-RHEL8-DOTNET-1439600" }, { "name": "https://access.redhat.com/errata/RHSA-2020:3699", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2020:3699" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "[2.1,3.1]", "affected_versions": "All versions starting from 2.1 up to 3.1", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2020-10-02", "description": "A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names. The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded. The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names., aka \u0027Microsoft ASP.NET Core Security Feature Bypass Vulnerability\u0027.", "fixed_versions": [ "3.1.8" ], "identifier": "CVE-2020-1045", "identifiers": [ "CVE-2020-1045" ], "not_impacted": "All versions before 2.1, all versions after 3.1", "package_slug": "nuget/Microsoft.AspNetCore.All", "pubdate": "2020-09-11", "solution": "Upgrade to version 3.1.8 or above.", "title": "Improper Input Validation", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-1045", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045", "https://github.com/dotnet/announcements/issues/165" ], "uuid": "0fa8c9d0-386f-4331-b825-2746499e224f" }, { "affected_range": "[3.1.0,3.1.8)", "affected_versions": "All versions starting from 3.1.0 before 3.1.8", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-08-03", "description": "A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names. The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded. The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names., aka \u0027Microsoft ASP.NET Core Security Feature Bypass Vulnerability\u0027.", "fixed_versions": [ "3.1.8" ], "identifier": "CVE-2020-1045", "identifiers": [ "GHSA-hxrm-9w7p-39cc", "CVE-2020-1045" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.8", "package_slug": "nuget/Microsoft.AspNetCore.App.Ref", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.8 or above.", "title": "Cookie parsing failure", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-1045", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3/", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045", "https://github.com/github/advisory-database/issues/302", "https://github.com/dotnet/aspnetcore/pull/24264", "https://github.com/advisories/GHSA-hxrm-9w7p-39cc" ], "uuid": "abfae8f0-eecf-45e4-8e3b-22108e09ca97" }, { "affected_range": "[3.1.0,3.1.8)", "affected_versions": "All versions starting from 3.1.0 before 3.1.8", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-08-26", "description": "A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names. The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded. The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names., aka \u0027Microsoft ASP.NET Core Security Feature Bypass Vulnerability\u0027.", "fixed_versions": [ "3.1.8" ], "identifier": "CVE-2020-1045", "identifiers": [ "GHSA-hxrm-9w7p-39cc", "CVE-2020-1045" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.8", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.linux-arm", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.8 or above.", "title": "Cookie parsing failure", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-1045", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3/", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045", "https://github.com/github/advisory-database/issues/302", "https://github.com/dotnet/aspnetcore/pull/24264", "https://github.com/dotnet/announcements/issues/165", "https://github.com/dotnet/aspnetcore/issues/25701", "https://github.com/dotnet/aspnetcore/issues/25701#issuecomment-689434477", "https://github.com/advisories/GHSA-hxrm-9w7p-39cc" ], "uuid": "17c352af-7f6d-4111-b308-c68a6e5ee2ac" }, { "affected_range": "[3.1.0,3.1.8)", "affected_versions": "All versions starting from 3.1.0 before 3.1.8", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-08-26", "description": "A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names. The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded. The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names., aka \u0027Microsoft ASP.NET Core Security Feature Bypass Vulnerability\u0027.", "fixed_versions": [ "3.1.8" ], "identifier": "CVE-2020-1045", "identifiers": [ "GHSA-hxrm-9w7p-39cc", "CVE-2020-1045" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.8", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.linux-arm64", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.8 or above.", "title": "Cookie parsing failure", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-1045", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3/", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045", "https://github.com/github/advisory-database/issues/302", "https://github.com/dotnet/aspnetcore/pull/24264", "https://github.com/dotnet/announcements/issues/165", "https://github.com/dotnet/aspnetcore/issues/25701", "https://github.com/dotnet/aspnetcore/issues/25701#issuecomment-689434477", "https://github.com/advisories/GHSA-hxrm-9w7p-39cc" ], "uuid": "705a3e72-dce6-4975-842c-84b4e30c1add" }, { "affected_range": "[3.1.0,3.1.8)", "affected_versions": "All versions starting from 3.1.0 before 3.1.8", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-08-26", "description": "A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names. The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded. The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names., aka \u0027Microsoft ASP.NET Core Security Feature Bypass Vulnerability\u0027.", "fixed_versions": [ "3.1.8" ], "identifier": "CVE-2020-1045", "identifiers": [ "GHSA-hxrm-9w7p-39cc", "CVE-2020-1045" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.8", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.linux-musl-arm64", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.8 or above.", "title": "Cookie parsing failure", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-1045", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3/", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045", "https://github.com/github/advisory-database/issues/302", "https://github.com/dotnet/aspnetcore/pull/24264", "https://github.com/dotnet/announcements/issues/165", "https://github.com/dotnet/aspnetcore/issues/25701", "https://github.com/dotnet/aspnetcore/issues/25701#issuecomment-689434477", "https://github.com/advisories/GHSA-hxrm-9w7p-39cc" ], "uuid": "bde90e24-ef84-486e-9fef-4f6da63b3588" }, { "affected_range": "[3.1.0,3.1.8)", "affected_versions": "All versions starting from 3.1.0 before 3.1.8", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-08-26", "description": "A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names. The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded. The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names., aka \u0027Microsoft ASP.NET Core Security Feature Bypass Vulnerability\u0027.", "fixed_versions": [ "3.1.8" ], "identifier": "CVE-2020-1045", "identifiers": [ "GHSA-hxrm-9w7p-39cc", "CVE-2020-1045" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.8", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.linux-musl-x64", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.8 or above.", "title": "Cookie parsing failure", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-1045", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3/", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045", "https://github.com/github/advisory-database/issues/302", "https://github.com/dotnet/aspnetcore/pull/24264", "https://github.com/dotnet/announcements/issues/165", "https://github.com/dotnet/aspnetcore/issues/25701", "https://github.com/dotnet/aspnetcore/issues/25701#issuecomment-689434477", "https://github.com/advisories/GHSA-hxrm-9w7p-39cc" ], "uuid": "021b1353-16b3-47bc-b65b-2a05cb83dc4f" }, { "affected_range": "[3.1.0,3.1.8)", "affected_versions": "All versions starting from 3.1.0 before 3.1.8", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-08-26", "description": "A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names. The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded. The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names., aka \u0027Microsoft ASP.NET Core Security Feature Bypass Vulnerability\u0027.", "fixed_versions": [ "3.1.8" ], "identifier": "CVE-2020-1045", "identifiers": [ "GHSA-hxrm-9w7p-39cc", "CVE-2020-1045" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.8", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.linux-x64", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.8 or above.", "title": "Cookie parsing failure", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-1045", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3/", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045", "https://github.com/github/advisory-database/issues/302", "https://github.com/dotnet/aspnetcore/pull/24264", "https://github.com/dotnet/announcements/issues/165", "https://github.com/dotnet/aspnetcore/issues/25701", "https://github.com/dotnet/aspnetcore/issues/25701#issuecomment-689434477", "https://github.com/advisories/GHSA-hxrm-9w7p-39cc" ], "uuid": "f4039477-e166-4cf1-b9c9-bbd9fad431e4" }, { "affected_range": "[3.1.0,3.1.8)", "affected_versions": "All versions starting from 3.1.0 before 3.1.8", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-08-26", "description": "A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names. The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded. The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names., aka \u0027Microsoft ASP.NET Core Security Feature Bypass Vulnerability\u0027.", "fixed_versions": [ "3.1.8" ], "identifier": "CVE-2020-1045", "identifiers": [ "GHSA-hxrm-9w7p-39cc", "CVE-2020-1045" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.8", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.osx-x64", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.8 or above.", "title": "Cookie parsing failure", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-1045", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3/", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045", "https://github.com/github/advisory-database/issues/302", "https://github.com/dotnet/aspnetcore/pull/24264", "https://github.com/dotnet/announcements/issues/165", "https://github.com/dotnet/aspnetcore/issues/25701", "https://github.com/dotnet/aspnetcore/issues/25701#issuecomment-689434477", "https://github.com/advisories/GHSA-hxrm-9w7p-39cc" ], "uuid": "9c7e5db1-b093-4db7-bc8d-b6f9fddb10cb" }, { "affected_range": "[3.1.0,3.1.8)", "affected_versions": "All versions starting from 3.1.0 before 3.1.8", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-08-26", "description": "A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names. The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded. The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names., aka \u0027Microsoft ASP.NET Core Security Feature Bypass Vulnerability\u0027.", "fixed_versions": [ "3.1.8" ], "identifier": "CVE-2020-1045", "identifiers": [ "GHSA-hxrm-9w7p-39cc", "CVE-2020-1045" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.8", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.win-arm", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.8 or above.", "title": "Cookie parsing failure", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-1045", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3/", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045", "https://github.com/github/advisory-database/issues/302", "https://github.com/dotnet/aspnetcore/pull/24264", "https://github.com/dotnet/announcements/issues/165", "https://github.com/dotnet/aspnetcore/issues/25701", "https://github.com/dotnet/aspnetcore/issues/25701#issuecomment-689434477", "https://github.com/advisories/GHSA-hxrm-9w7p-39cc" ], "uuid": "209a72d6-60dd-492b-81e7-2cfa0f0ef859" }, { "affected_range": "[3.1.5,3.1.8)", "affected_versions": "All versions starting from 3.1.5 before 3.1.8", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-09-06", "description": "A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names. The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded. The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names., aka \u0027Microsoft ASP.NET Core Security Feature Bypass Vulnerability\u0027.", "fixed_versions": [ "3.1.8" ], "identifier": "CVE-2020-1045", "identifiers": [ "GHSA-hxrm-9w7p-39cc", "CVE-2020-1045" ], "not_impacted": "All versions before 3.1.5, all versions starting from 3.1.8", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.win-arm64", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.8 or above.", "title": "Cookie parsing failure", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-1045", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3/", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045", "https://github.com/github/advisory-database/issues/302", "https://github.com/dotnet/aspnetcore/pull/24264", "https://github.com/dotnet/announcements/issues/165", "https://github.com/dotnet/aspnetcore/issues/25701", "https://github.com/dotnet/aspnetcore/issues/25701#issuecomment-689434477", "https://github.com/advisories/GHSA-hxrm-9w7p-39cc" ], "uuid": "1a7abad4-5ecc-452b-885a-e2ba445e08a2" }, { "affected_range": "[3.1.0,3.1.8)", "affected_versions": "All versions starting from 3.1.0 before 3.1.8", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-08-26", "description": "A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names. The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded. The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names., aka \u0027Microsoft ASP.NET Core Security Feature Bypass Vulnerability\u0027.", "fixed_versions": [ "3.1.8" ], "identifier": "CVE-2020-1045", "identifiers": [ "GHSA-hxrm-9w7p-39cc", "CVE-2020-1045" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.8", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.win-x64", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.8 or above.", "title": "Cookie parsing failure", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-1045", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3/", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045", "https://github.com/github/advisory-database/issues/302", "https://github.com/dotnet/aspnetcore/pull/24264", "https://github.com/dotnet/announcements/issues/165", "https://github.com/dotnet/aspnetcore/issues/25701", "https://github.com/dotnet/aspnetcore/issues/25701#issuecomment-689434477", "https://github.com/advisories/GHSA-hxrm-9w7p-39cc" ], "uuid": "996ccdb8-ea61-4982-89c6-a29b0005abd3" }, { "affected_range": "[3.1.0,3.1.8)", "affected_versions": "All versions starting from 3.1.0 before 3.1.8", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-08-26", "description": "A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names. The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded. The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names., aka \u0027Microsoft ASP.NET Core Security Feature Bypass Vulnerability\u0027.", "fixed_versions": [ "3.1.8" ], "identifier": "CVE-2020-1045", "identifiers": [ "GHSA-hxrm-9w7p-39cc", "CVE-2020-1045" ], "not_impacted": "All versions before 3.1.0, all versions starting from 3.1.8", "package_slug": "nuget/Microsoft.AspNetCore.App.Runtime.win-x86", "pubdate": "2022-05-24", "solution": "Upgrade to version 3.1.8 or above.", "title": "Cookie parsing failure", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-1045", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3/", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045", "https://github.com/github/advisory-database/issues/302", "https://github.com/dotnet/aspnetcore/pull/24264", "https://github.com/dotnet/announcements/issues/165", "https://github.com/dotnet/aspnetcore/issues/25701", "https://github.com/dotnet/aspnetcore/issues/25701#issuecomment-689434477", "https://github.com/advisories/GHSA-hxrm-9w7p-39cc" ], "uuid": "c1fb356b-5068-4ab4-a323-cc560240191d" }, { "affected_range": "(,2.1.21]", "affected_versions": "All versions up to 2.1.21", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-08-26", "description": "A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names. The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded. The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names., aka \u0027Microsoft ASP.NET Core Security Feature Bypass Vulnerability\u0027.", "fixed_versions": [ "2.1.22" ], "identifier": "CVE-2020-1045", "identifiers": [ "GHSA-hxrm-9w7p-39cc", "CVE-2020-1045" ], "not_impacted": "All versions after 2.1.21", "package_slug": "nuget/Microsoft.AspNetCore.App", "pubdate": "2022-05-24", "solution": "Upgrade to version 2.1.22 or above.", "title": "Cookie parsing failure", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-1045", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3/", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045", "https://github.com/github/advisory-database/issues/302", "https://github.com/dotnet/aspnetcore/pull/24264", "https://github.com/dotnet/announcements/issues/165", "https://github.com/dotnet/aspnetcore/issues/25701", "https://github.com/dotnet/aspnetcore/issues/25701#issuecomment-689434477", "https://github.com/advisories/GHSA-hxrm-9w7p-39cc" ], "uuid": "0d864951-8603-4073-a3fc-3704d4bf5376" }, { "affected_range": "(,2.1.22)", "affected_versions": "All versions before 2.1.22", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-07-08", "description": "A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names. The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded. The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names., aka \u0027Microsoft ASP.NET Core Security Feature Bypass Vulnerability\u0027.", "fixed_versions": [ "2.1.22" ], "identifier": "CVE-2020-1045", "identifiers": [ "GHSA-hxrm-9w7p-39cc", "CVE-2020-1045" ], "not_impacted": "All versions starting from 2.1.22", "package_slug": "nuget/Microsoft.AspNetCore.Http", "pubdate": "2022-05-24", "solution": "Upgrade to version 2.1.22 or above.", "title": "Cookie parsing failure", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-1045", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3/", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045", "https://github.com/github/advisory-database/issues/302", "https://github.com/dotnet/aspnetcore/pull/24264", "https://github.com/advisories/GHSA-hxrm-9w7p-39cc" ], "uuid": "744de9f2-7edb-4e53-976c-d20777c420f8" }, { "affected_range": "[2.1.21],[3.1.7]", "affected_versions": "Version 2.1.21, version 3.1.7", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-07-28", "description": "A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names. The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded. The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names., aka \u0027Microsoft ASP.NET Core Security Feature Bypass Vulnerability\u0027.", "fixed_versions": [ "2.1.22", "3.1.8" ], "identifier": "CVE-2020-1045", "identifiers": [ "GHSA-hxrm-9w7p-39cc", "CVE-2020-1045" ], "not_impacted": "All versions before 2.1.21, all versions after 2.1.21 before 3.1.7, all versions after 3.1.7", "package_slug": "nuget/Microsoft.AspNetCore.Owin", "pubdate": "2022-05-24", "solution": "Upgrade to versions 2.1.22, 3.1.8 or above.", "title": "Cookie parsing failure", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-1045", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3/", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045", "https://github.com/github/advisory-database/issues/302", "https://github.com/dotnet/aspnetcore/pull/24264", "https://github.com/advisories/GHSA-hxrm-9w7p-39cc" ], "uuid": "cd03ddb0-8c9e-4e84-a7ee-5fd290d7e981" }, { "affected_range": "(,4.1.1)", "affected_versions": "All versions before 4.1.1", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-08-26", "description": "A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names. The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded. The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names., aka \u0027Microsoft ASP.NET Core Security Feature Bypass Vulnerability\u0027.", "fixed_versions": [ "4.1.1" ], "identifier": "CVE-2020-1045", "identifiers": [ "GHSA-hxrm-9w7p-39cc", "CVE-2020-1045" ], "not_impacted": "All versions starting from 4.1.1", "package_slug": "nuget/Microsoft.Owin", "pubdate": "2022-05-24", "solution": "Upgrade to version 4.1.1 or above.", "title": "Cookie parsing failure", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-1045", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3/", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045", "https://github.com/github/advisory-database/issues/302", "https://github.com/dotnet/aspnetcore/pull/24264", "https://github.com/dotnet/announcements/issues/165", "https://github.com/dotnet/aspnetcore/issues/25701", "https://github.com/dotnet/aspnetcore/issues/25701#issuecomment-689434477", "https://github.com/advisories/GHSA-hxrm-9w7p-39cc" ], "uuid": "bf3c17ba-ebed-4011-a2ff-468ef6217380" } ] }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6237BE3-2B52-4E81-BEB4-AC370C79CD6F", "versionEndIncluding": "2.1.21", "versionStartIncluding": "2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*", "matchCriteriaId": "30C25D29-DA72-404C-934E-7CCA3CCB8793", "versionEndExcluding": "3.1.8", "versionStartIncluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_aus:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "7883DE07-470D-4160-9767-4F831B75B9A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_aus:8.4:*:*:*:*:*:*:*", "matchCriteriaId": "4D5F4FA7-E5C5-4C23-BDA8-36A36972E4F4", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_aus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CA4F12A-5BC5-4D75-8F20-80D8BB2C5BF2", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "831F0F47-3565-4763-B16F-C87B1FF2035E", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*", "matchCriteriaId": "0E3F09B5-569F-4C58-9FCA-3C0953D107B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "6C3741B8-851F-475D-B428-523F4F722350", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_tus:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "9C24797C-0397-4D4F-ADC3-3B99095DBB35", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_tus:8.4:*:*:*:*:*:*:*", "matchCriteriaId": "BF14A415-15BD-4A6C-87CF-675E09390474", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_tus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "C237415F-33FE-4686-9B19-A0916BF75D2D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "\u003cp\u003eA security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.\u003c/p\u003e\n\u003cp\u003eThe ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.\u003c/p\u003e\n\u003cp\u003eThe security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names.\u003c/p\u003e\n" }, { "lang": "es", "value": "Se presenta una vulnerabilidad de omisi\u00f3n de la caracter\u00edstica de seguridad en la manera en que Microsoft ASP.NET Core analiza los nombres de cookies codificados. El analizador de cookies de ASP.NET Core decodifica cadenas de cookies completas que podr\u00edan permitir a un atacante malicioso establecer una segunda cookie con el nombre codificado en porcentaje. La actualizaci\u00f3n de seguridad aborda la vulnerabilidad al corregir la manera en que el analizador de cookies ASP.NET Core maneja los nombres codificados, tambi\u00e9n se conoce como \"Microsoft ASP.NET Core Security Feature Bypass Vulnerability\"" } ], "id": "CVE-2020-1045", "lastModified": "2023-12-31T22:15:55.070", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "secure@microsoft.com", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Secondary" } ] }, "published": "2020-09-11T17:15:18.307", "references": [ { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:3699" }, { "source": "secure@microsoft.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/dotnet/core/blob/main/release-notes/3.1/3.1.8/3.1.8.md#changes-in-318" }, { "source": "secure@microsoft.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LN2FUVBSVPGK7AU3NMLO3YR6CGONQPB/" }, { "source": "secure@microsoft.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ASICXQXS4M7MTAF6SGQMCLCA63DLCUT3/" }, { "source": "secure@microsoft.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1045" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-RHEL8-DOTNET-1439600" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.