CVE-2024-2756

Due to an incomplete fix to CVE-2022-31629 https://github.com/advisories/GHSA-c43m-486j-j32p , network and same-site attackers can set a standard insecure cookie in the victim's browser which is treated as a __Host- or __Secure- cookie by PHP applications. 
Configurations

No configuration.

History

21 Nov 2024, 09:10

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2024/04/12/11 - () http://www.openwall.com/lists/oss-security/2024/04/12/11 -
References () https://github.com/php/php-src/security/advisories/GHSA-wpj3-hf5j-x4v4 - () https://github.com/php/php-src/security/advisories/GHSA-wpj3-hf5j-x4v4 -
References () https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html - () https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html -
References () https://security.netapp.com/advisory/ntap-20240510-0008/ - () https://security.netapp.com/advisory/ntap-20240510-0008/ -

10 Jun 2024, 18:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240510-0008/ -

08 May 2024, 01:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html -

01 May 2024, 17:15

Type Values Removed Values Added
Summary
  • (es) Debido a una solución incompleta de CVE-2022-31629 https://github.com/advisories/GHSA-c43m-486j-j32p, los atacantes de la red y del mismo sitio pueden establecer una cookie estándar insegura en el navegador de la víctima que se trata como una __Host- o __Secure- cookie por aplicaciones PHP.
References
  • () http://www.openwall.com/lists/oss-security/2024/04/12/11 -

29 Apr 2024, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-29 04:15

Updated : 2024-11-21 09:10


NVD link : CVE-2024-2756

Mitre link : CVE-2024-2756

CVE.ORG link : CVE-2024-2756


JSON object : View

Products Affected

No product.

CWE
CWE-20

Improper Input Validation