Full stack solution using Vue.js, Azure Static Web Apps, Azure Function, Azure SQL Database and a microservice architecture to monitor in real-time public transportation data, create a geofence and send notification when geofence is activated
MIT License
0
stars
0
forks
source link
CVE-2020-1045 (High) detected in microsoft.aspnetcore.http.2.1.0.nupkg #108
A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.
The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.
The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names.
CVE-2020-1045 - High Severity Vulnerability
Vulnerable Library - microsoft.aspnetcore.http.2.1.0.nupkg
ASP.NET Core default HTTP feature implementations.
Library home page: https://api.nuget.org/packages/microsoft.aspnetcore.http.2.1.0.nupkg
Path to dependency file: /azure-function/dotnet/GetBusData.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.aspnetcore.http/2.1.0/microsoft.aspnetcore.http.2.1.0.nupkg
Dependency Hierarchy: - microsoft.net.sdk.functions.3.0.7.nupkg (Root Library) - microsoft.azure.webjobs.extensions.http.3.0.0.nupkg - :x: **microsoft.aspnetcore.http.2.1.0.nupkg** (Vulnerable Library)
Found in base branch: main
Vulnerability Details
A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.
The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.
The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names.
Publish Date: 2020-09-11
URL: CVE-2020-1045
CVSS 3 Score Details (7.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://github.com/advisories/GHSA-hxrm-9w7p-39cc
Release Date: 2020-09-11
Fix Resolution: Microsoft.AspNetCore.Http - 2.1.22. Microsoft.AspNetCore.App - 2.1.22, Microsoft.AspNetCore.App.Runtime - 3.1.8, Microsoft.Owin - 4.1.1
Step up your Open Source Security Game with Mend here