*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.
The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.
The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names.
Vulnerable Library - vonage.5.3.0.nupkg
Path to dependency file: /dotnet-skeleton-app.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.aspnetcore.http/1.1.2/microsoft.aspnetcore.http.1.1.2.nupkg
Found in HEAD commit: b6a7222f95cd8614a9edf80fbe0a0a861abf0566
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2020-1045
### Vulnerable Library - microsoft.aspnetcore.http.1.1.2.nupkgASP.NET Core default HTTP feature implementations.
Library home page: https://api.nuget.org/packages/microsoft.aspnetcore.http.1.1.2.nupkg
Path to dependency file: /dotnet-skeleton-app.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.aspnetcore.http/1.1.2/microsoft.aspnetcore.http.1.1.2.nupkg
Dependency Hierarchy: - vonage.5.3.0.nupkg (Root Library) - microsoft.aspnetcore.mvc.1.1.8.nupkg - microsoft.aspnetcore.mvc.viewfeatures.1.1.8.nupkg - microsoft.aspnetcore.mvc.core.1.1.8.nupkg - :x: **microsoft.aspnetcore.http.1.1.2.nupkg** (Vulnerable Library)
Found in HEAD commit: b6a7222f95cd8614a9edf80fbe0a0a861abf0566
Found in base branch: main
### Vulnerability DetailsA security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.
The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.
The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names.
Publish Date: 2020-09-11
URL: CVE-2020-1045
### Threat AssessmentExploit Maturity: Proof of concept
EPSS: 0.4%
### CVSS 3 Score Details (7.5)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Origin: https://github.com/advisories/GHSA-hxrm-9w7p-39cc
Release Date: 2020-09-11
Fix Resolution: Microsoft.AspNetCore.Http - 2.1.22. Microsoft.AspNetCore.App - 2.1.22, Microsoft.AspNetCore.App.Runtime - 3.1.8, Microsoft.Owin - 4.1.1