You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.
The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.
The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names.
Path to dependency file: /dvcsharp-core-api.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.aspnetcore.http/2.0.1/microsoft.aspnetcore.http.2.0.1.nupkg
Found in HEAD commit: 169cda0ff1feb6d10abc920cb8a3bc3ba917f822
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
Vulnerable Library - system.text.encodings.web.4.4.0.nupkg
Provides types for encoding and escaping strings for use in JavaScript, HyperText Markup Language (H...
Library home page: https://api.nuget.org/packages/system.text.encodings.web.4.4.0.nupkg
Path to dependency file: /dvcsharp-core-api.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.text.encodings.web/4.4.0/system.text.encodings.web.4.4.0.nupkg
Dependency Hierarchy:
Found in HEAD commit: 169cda0ff1feb6d10abc920cb8a3bc3ba917f822
Found in base branch: master
Reachability Analysis
This vulnerability is potentially reachable
Vulnerability Details
.NET Core Remote Code Execution Vulnerability
Publish Date: 2021-02-25
URL: CVE-2021-26701
Threat Assessment
Exploit Maturity: Unproven
EPSS: 14.7%
CVSS 4 Score Details (9.2)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2021-02-25
Fix Resolution: System.Text.Encodings.Web - 4.5.1,4.7.2,5.0.1
Vulnerable Library - microsoft.aspnetcore.http.2.0.1.nupkg
ASP.NET Core default HTTP feature implementations.
Library home page: https://api.nuget.org/packages/microsoft.aspnetcore.http.2.0.1.nupkg
Path to dependency file: /dvcsharp-core-api.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.aspnetcore.http/2.0.1/microsoft.aspnetcore.http.2.0.1.nupkg
Dependency Hierarchy:
Found in HEAD commit: 169cda0ff1feb6d10abc920cb8a3bc3ba917f822
Found in base branch: master
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.
The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.
The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names.
Publish Date: 2020-09-11
URL: CVE-2020-1045
Threat Assessment
Exploit Maturity: Proof of concept
EPSS: 0.1%
CVSS 4 Score Details (7.7)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-hxrm-9w7p-39cc
Release Date: 2020-09-11
Fix Resolution: Microsoft.AspNetCore.Http - 2.1.22. Microsoft.AspNetCore.App - 2.1.22, Microsoft.AspNetCore.App.Runtime - 3.1.8, Microsoft.Owin - 4.1.1
The text was updated successfully, but these errors were encountered: