vulnerability
CentOS Linux: CVE-2020-1045: Important: .NET Core 3.1 security and bugfix update (CESA-2020:3699)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | Sep 8, 2020 | Sep 9, 2020 | Jan 3, 2024 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Sep 8, 2020
Added
Sep 9, 2020
Modified
Jan 3, 2024
Description
<p>A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.</p>
<p>The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.</p>
<p>The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names.</p>
Solutions
centos-upgrade-aspnetcore-runtime-3-1centos-upgrade-aspnetcore-targeting-pack-3-1centos-upgrade-dotnetcentos-upgrade-dotnet-apphost-pack-3-1centos-upgrade-dotnet-apphost-pack-3-1-debuginfocentos-upgrade-dotnet-hostcentos-upgrade-dotnet-host-debuginfocentos-upgrade-dotnet-hostfxr-3-1centos-upgrade-dotnet-hostfxr-3-1-debuginfocentos-upgrade-dotnet-runtime-3-1centos-upgrade-dotnet-runtime-3-1-debuginfocentos-upgrade-dotnet-sdk-3-1centos-upgrade-dotnet-sdk-3-1-debuginfocentos-upgrade-dotnet-targeting-pack-3-1centos-upgrade-dotnet-templates-3-1centos-upgrade-dotnet3-1-debuginfocentos-upgrade-dotnet3-1-debugsourcecentos-upgrade-netstandard-targeting-pack-2-1
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.