Bug 2275058 (CVE-2024-2756) - CVE-2024-2756 php: host/secure cookie bypass due to partial CVE-2022-31629 fix
Summary: CVE-2024-2756 php: host/secure cookie bypass due to partial CVE-2022-31629 fix
Keywords:
Status: NEW
Alias: CVE-2024-2756
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2275059
Blocks: 2275070
TreeView+ depends on / blocked
 
Reported: 2024-04-15 07:29 UTC by ybuenos
Modified: 2024-04-18 08:59 UTC (History)
0 users

Fixed In Version: php 8.1.28, php 8.2.18, php 8.3.6
Doc Type: ---
Doc Text:
An improper input validation vulnerability was found in PHP. Due to an incomplete fix to CVE-2022-31629, network and same-site attackers can set a standard insecure cookie in the victim's browser.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description ybuenos 2024-04-15 07:29:30 UTC
Due to an incomplete fix to CVE-2022-31629, network and same-site attackers can set a standard insecure cookie in the victim's browser which is treated as a __Host- or __Secure- cookie by PHP applications.

The vulnerability is identical to one previously described in https://bugs.php.net/bug.php?id=81727. Unfortunatly, since CVE-2022-31629 got only partially fixed in PHP >8.1.11, cookies starting with _[Host- are parsed by PHP applications as __Host-.

Comment 1 ybuenos 2024-04-15 07:29:43 UTC
Created php tracking bugs for this issue:

Affects: fedora-all [bug 2275059]


Note You need to log in before you can comment on or make changes to this bug.