Bug 2275058 (CVE-2024-2756)

Summary: CVE-2024-2756 php: host/secure cookie bypass due to partial CVE-2022-31629 fix
Product: [Other] Security Response Reporter: ybuenos
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: php 8.1.28, php 8.2.18, php 8.3.6 Doc Type: ---
Doc Text:
An improper input validation vulnerability was found in PHP. Due to an incomplete fix to CVE-2022-31629, network and same-site attackers can set a standard insecure cookie in the victim's browser.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2275059    
Bug Blocks: 2275070    

Description ybuenos 2024-04-15 07:29:30 UTC
Due to an incomplete fix to CVE-2022-31629, network and same-site attackers can set a standard insecure cookie in the victim's browser which is treated as a __Host- or __Secure- cookie by PHP applications.

The vulnerability is identical to one previously described in https://bugs.php.net/bug.php?id=81727. Unfortunatly, since CVE-2022-31629 got only partially fixed in PHP >8.1.11, cookies starting with _[Host- are parsed by PHP applications as __Host-.

Comment 1 ybuenos 2024-04-15 07:29:43 UTC
Created php tracking bugs for this issue:

Affects: fedora-all [bug 2275059]

Comment 4 errata-xmlrpc 2024-12-11 11:44:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:10952 https://access.redhat.com/errata/RHSA-2024:10952

Comment 5 errata-xmlrpc 2024-12-11 11:44:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:10950 https://access.redhat.com/errata/RHSA-2024:10950

Comment 6 errata-xmlrpc 2024-12-11 11:45:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:10949 https://access.redhat.com/errata/RHSA-2024:10949

Comment 7 errata-xmlrpc 2024-12-11 11:45:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:10951 https://access.redhat.com/errata/RHSA-2024:10951

Comment 8 errata-xmlrpc 2025-05-13 10:35:32 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:7315 https://access.redhat.com/errata/RHSA-2025:7315