Nexmo / dotnet-skeleton-app

Sample .NET app to test environment setup
MIT License
0 stars 0 forks source link

vonage.5.3.0.nupkg: 1 vulnerabilities (highest severity is: 7.5) #8

Open mend-for-github-com[bot] opened 2 years ago

mend-for-github-com[bot] commented 2 years ago
Vulnerable Library - vonage.5.3.0.nupkg

Path to dependency file: /dotnet-skeleton-app.csproj

Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.aspnetcore.http/1.1.2/microsoft.aspnetcore.http.1.1.2.nupkg

Found in HEAD commit: b6a7222f95cd8614a9edf80fbe0a0a861abf0566

Vulnerabilities

CVE Severity CVSS Exploit Maturity EPSS Dependency Type Fixed in (vonage.5.3.0.nupkg version) Remediation Possible** Reachability
CVE-2020-1045 High 7.5 Proof of concept 0.4% microsoft.aspnetcore.http.1.1.2.nupkg Transitive N/A*

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2020-1045 ### Vulnerable Library - microsoft.aspnetcore.http.1.1.2.nupkg

ASP.NET Core default HTTP feature implementations.

Library home page: https://api.nuget.org/packages/microsoft.aspnetcore.http.1.1.2.nupkg

Path to dependency file: /dotnet-skeleton-app.csproj

Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.aspnetcore.http/1.1.2/microsoft.aspnetcore.http.1.1.2.nupkg

Dependency Hierarchy: - vonage.5.3.0.nupkg (Root Library) - microsoft.aspnetcore.mvc.1.1.8.nupkg - microsoft.aspnetcore.mvc.viewfeatures.1.1.8.nupkg - microsoft.aspnetcore.mvc.core.1.1.8.nupkg - :x: **microsoft.aspnetcore.http.1.1.2.nupkg** (Vulnerable Library)

Found in HEAD commit: b6a7222f95cd8614a9edf80fbe0a0a861abf0566

Found in base branch: main

### Vulnerability Details

A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.

The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.

The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names.

Publish Date: 2020-09-11

URL: CVE-2020-1045

### Threat Assessment

Exploit Maturity: Proof of concept

EPSS: 0.4%

### CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-hxrm-9w7p-39cc

Release Date: 2020-09-11

Fix Resolution: Microsoft.AspNetCore.Http - 2.1.22. Microsoft.AspNetCore.App - 2.1.22, Microsoft.AspNetCore.App.Runtime - 3.1.8, Microsoft.Owin - 4.1.1