nexmo-community / Luis-Sms-Dotnet-Sample

Sample showing how to leverage the Vonage SMS API with Luis AI
MIT License
0 stars 0 forks source link

nexmo.csharp.client.4.3.1.nupkg: 1 vulnerabilities (highest severity is: 7.5) #1

Open mend-for-github-com[bot] opened 2 years ago

mend-for-github-com[bot] commented 2 years ago
Vulnerable Library - nexmo.csharp.client.4.3.1.nupkg

Path to dependency file: /LuisVonageDemo/LuisVonageDemo.csproj

Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.aspnetcore.http/1.1.2/microsoft.aspnetcore.http.1.1.2.nupkg

Found in HEAD commit: d843c7119b59ac30df92ef54e2563edb0a72059d

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (nexmo.csharp.client.4.3.1.nupkg version) Remediation Possible**
CVE-2020-1045 High 7.5 microsoft.aspnetcore.http.1.1.2.nupkg Transitive N/A*

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2020-1045 ### Vulnerable Library - microsoft.aspnetcore.http.1.1.2.nupkg

ASP.NET Core default HTTP feature implementations.

Library home page: https://api.nuget.org/packages/microsoft.aspnetcore.http.1.1.2.nupkg

Path to dependency file: /LuisVonageDemo/LuisVonageDemo.csproj

Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.aspnetcore.http/1.1.2/microsoft.aspnetcore.http.1.1.2.nupkg

Dependency Hierarchy: - nexmo.csharp.client.4.3.1.nupkg (Root Library) - microsoft.aspnetcore.mvc.1.1.8.nupkg - microsoft.aspnetcore.mvc.viewfeatures.1.1.8.nupkg - microsoft.aspnetcore.mvc.core.1.1.8.nupkg - :x: **microsoft.aspnetcore.http.1.1.2.nupkg** (Vulnerable Library)

Found in HEAD commit: d843c7119b59ac30df92ef54e2563edb0a72059d

Found in base branch: main

### Vulnerability Details

A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.

The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.

The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names.

Publish Date: 2020-09-11

URL: CVE-2020-1045

### CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Release Date: 2020-09-11

Fix Resolution: Microsoft.AspNetCore.App - 2.1.22, Microsoft.AspNetCore.All - 2.1.22,Microsoft.NETCore.App - 2.1.22, Microsoft.AspNetCore.Http - 2.1.22