Rapid7 Vulnerability & Exploit Database

Red Hat: CVE-2020-7070: CVE-2020-7070 php: URL decoding of cookie names can lead to different interpretation of cookies between browser and server (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Red Hat: CVE-2020-7070: CVE-2020-7070 php: URL decoding of cookie names can lead to different interpretation of cookies between browser and server (Multiple Advisories)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
10/02/2020
Created
11/11/2021
Added
11/10/2021
Modified
12/15/2023

Description

In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information.

Solution(s)

  • redhat-upgrade-apcu-panel
  • redhat-upgrade-libzip
  • redhat-upgrade-libzip-debuginfo
  • redhat-upgrade-libzip-debugsource
  • redhat-upgrade-libzip-devel
  • redhat-upgrade-libzip-tools
  • redhat-upgrade-libzip-tools-debuginfo
  • redhat-upgrade-php
  • redhat-upgrade-php-bcmath
  • redhat-upgrade-php-bcmath-debuginfo
  • redhat-upgrade-php-cli
  • redhat-upgrade-php-cli-debuginfo
  • redhat-upgrade-php-common
  • redhat-upgrade-php-common-debuginfo
  • redhat-upgrade-php-dba
  • redhat-upgrade-php-dba-debuginfo
  • redhat-upgrade-php-dbg
  • redhat-upgrade-php-dbg-debuginfo
  • redhat-upgrade-php-debuginfo
  • redhat-upgrade-php-debugsource
  • redhat-upgrade-php-devel
  • redhat-upgrade-php-embedded
  • redhat-upgrade-php-embedded-debuginfo
  • redhat-upgrade-php-enchant
  • redhat-upgrade-php-enchant-debuginfo
  • redhat-upgrade-php-ffi
  • redhat-upgrade-php-ffi-debuginfo
  • redhat-upgrade-php-fpm
  • redhat-upgrade-php-fpm-debuginfo
  • redhat-upgrade-php-gd
  • redhat-upgrade-php-gd-debuginfo
  • redhat-upgrade-php-gmp
  • redhat-upgrade-php-gmp-debuginfo
  • redhat-upgrade-php-intl
  • redhat-upgrade-php-intl-debuginfo
  • redhat-upgrade-php-json
  • redhat-upgrade-php-json-debuginfo
  • redhat-upgrade-php-ldap
  • redhat-upgrade-php-ldap-debuginfo
  • redhat-upgrade-php-mbstring
  • redhat-upgrade-php-mbstring-debuginfo
  • redhat-upgrade-php-mysqlnd
  • redhat-upgrade-php-mysqlnd-debuginfo
  • redhat-upgrade-php-odbc
  • redhat-upgrade-php-odbc-debuginfo
  • redhat-upgrade-php-opcache
  • redhat-upgrade-php-opcache-debuginfo
  • redhat-upgrade-php-pdo
  • redhat-upgrade-php-pdo-debuginfo
  • redhat-upgrade-php-pear
  • redhat-upgrade-php-pecl-apcu
  • redhat-upgrade-php-pecl-apcu-debuginfo
  • redhat-upgrade-php-pecl-apcu-debugsource
  • redhat-upgrade-php-pecl-apcu-devel
  • redhat-upgrade-php-pecl-rrd
  • redhat-upgrade-php-pecl-rrd-debuginfo
  • redhat-upgrade-php-pecl-rrd-debugsource
  • redhat-upgrade-php-pecl-xdebug
  • redhat-upgrade-php-pecl-xdebug-debuginfo
  • redhat-upgrade-php-pecl-xdebug-debugsource
  • redhat-upgrade-php-pecl-zip
  • redhat-upgrade-php-pecl-zip-debuginfo
  • redhat-upgrade-php-pecl-zip-debugsource
  • redhat-upgrade-php-pgsql
  • redhat-upgrade-php-pgsql-debuginfo
  • redhat-upgrade-php-process
  • redhat-upgrade-php-process-debuginfo
  • redhat-upgrade-php-snmp
  • redhat-upgrade-php-snmp-debuginfo
  • redhat-upgrade-php-soap
  • redhat-upgrade-php-soap-debuginfo
  • redhat-upgrade-php-xml
  • redhat-upgrade-php-xml-debuginfo
  • redhat-upgrade-php-xmlrpc
  • redhat-upgrade-php-xmlrpc-debuginfo

insightVM

Advanced vulnerability management analytics and reporting.
Key Features
  • Lightweight Endpoint Agent
  • Live Dashboards
  • Real Risk Prioritization
  • IT-Integrated Remediation Projects
  • Cloud, Virtual, and Container Assessment
  • Integrated Threat Feeds
  • Easy-to-Use RESTful API
  • Automation-Assisted Patching
  • Automated Containment
Free InsightVM Trial View All Features

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;