CVE-2020-8184 — Reliance on Cookies without Validation and Integrity Checking in a Security Decision in Project Rack
Severity
7.5HIGHNVD
NVD5.3CNA4.3GHSA5.3OSV8.6OSV5.9OSV5.3
EPSS
1.1%
top 22.26%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 19
Latest updateJan 27
Description
A reliance on cookies without validation/integrity check security vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages8 packages
Also affects: Debian Linux 10.0, 9.0, Fedora 31, 32, 33, Ubuntu Linux 12.04, 14.04, 16.04, 18.04, 20.04
Patches
🔴Vulnerability Details
12📋Vendor Advisories
8💬Community
6Bugzilla▶
CVE-2020-7070 php: URL decoding of cookie names can lead to different interpretation of cookies between browser and server↗2020-10-06
Bugzilla▶
CVE-2020-8184 rubygem-rack: percent-encoded cookies can be used to overwrite existing prefixed cookie names [epel-all]↗2020-06-19
Bugzilla▶
CVE-2020-8184 rubygem-rack: percent-encoded cookies can be used to overwrite existing prefixed cookie names [fedora-all]↗2020-06-19