Open mend-bolt-for-github[bot] opened 2 years ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
Vulnerable Library - microsoft.aspnetcore.healthchecks.1.0.0.nupkg
Path to dependency file: /src/Services/Webhooks/Webhooks.API/Webhooks.API.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.aspnetcore.http/2.1.1/microsoft.aspnetcore.http.2.1.1.nupkg
Found in HEAD commit: 58162be7965e66c71394dab67f66ed3d7cfaaef5
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2020-1045
### Vulnerable Library - microsoft.aspnetcore.http.2.1.1.nupkgASP.NET Core default HTTP feature implementations.
Library home page: https://api.nuget.org/packages/microsoft.aspnetcore.http.2.1.1.nupkg
Path to dependency file: /src/Services/Webhooks/Webhooks.API/Webhooks.API.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.aspnetcore.http/2.1.1/microsoft.aspnetcore.http.2.1.1.nupkg
Dependency Hierarchy: - microsoft.aspnetcore.healthchecks.1.0.0.nupkg (Root Library) - microsoft.aspnetcore.hosting.2.1.1.nupkg - :x: **microsoft.aspnetcore.http.2.1.1.nupkg** (Vulnerable Library)
Found in HEAD commit: 58162be7965e66c71394dab67f66ed3d7cfaaef5
Found in base branch: dev
### Vulnerability DetailsA security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.
The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.
The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names.
Publish Date: 2020-09-11
URL: CVE-2020-1045
### CVSS 3 Score Details (7.5)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Origin: https://github.com/advisories/GHSA-hxrm-9w7p-39cc
Release Date: 2020-09-11
Fix Resolution: Microsoft.AspNetCore.Http - 2.1.22. Microsoft.AspNetCore.App - 2.1.22, Microsoft.AspNetCore.App.Runtime - 3.1.8, Microsoft.Owin - 4.1.1
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)