Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-2756

Опубликовано: 29 апр. 2024
Источник: debian
EPSS Низкий

Описание

Due to an incomplete fix to CVE-2022-31629 https://github.com/advisories/GHSA-c43m-486j-j32p , network and same-site attackers can set a standard insecure cookie in the victim's browser which is treated as a __Host- or __Secure- cookie by PHP applications.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php8.2fixed8.2.18-1package
php7.4removedpackage
php7.3removedpackage

Примечания

  • Fixed in: 8.2.18, 8.1.28

  • https://github.com/php/php-src/security/advisories/GHSA-wpj3-hf5j-x4v4

  • https://github.com/php/php-src/commit/093c08af25fb323efa0c8e6154aa9fdeae3d3b53

EPSS

Процентиль: 92%
0.08774
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 1 года назад

Due to an incomplete fix to CVE-2022-31629 https://github.com/advisories/GHSA-c43m-486j-j32p , network and same-site attackers can set a standard insecure cookie in the victim's browser which is treated as a __Host- or __Secure- cookie by PHP applications.

CVSS3: 6.5
redhat
около 1 года назад

Due to an incomplete fix to CVE-2022-31629 https://github.com/advisories/GHSA-c43m-486j-j32p , network and same-site attackers can set a standard insecure cookie in the victim's browser which is treated as a __Host- or __Secure- cookie by PHP applications.

CVSS3: 6.5
nvd
около 1 года назад

Due to an incomplete fix to CVE-2022-31629 https://github.com/advisories/GHSA-c43m-486j-j32p , network and same-site attackers can set a standard insecure cookie in the victim's browser which is treated as a __Host- or __Secure- cookie by PHP applications.

CVSS3: 6.5
msrc
около 1 года назад

Описание отсутствует

github
около 1 года назад

__Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix

EPSS

Процентиль: 92%
0.08774
Низкий