Show plain JSON{"dataType": "CVE_RECORD", "cveMetadata": {"cveId": "CVE-2024-2756", "assignerOrgId": "dd77f84a-d19a-4638-8c3d-a322d820ed2b", "state": "PUBLISHED", "assignerShortName": "php", "dateReserved": "2024-03-21T05:10:24.594Z", "datePublished": "2024-04-29T03:34:16.912Z", "dateUpdated": "2025-02-13T17:46:30.643Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "affected", "product": "PHP", "vendor": "PHP Group", "versions": [{"lessThan": "8.1.28", "status": "affected", "version": "8.1.*", "versionType": "semver"}, {"lessThan": "8.2.18", "status": "affected", "version": "8.2.*", "versionType": "semver"}, {"lessThan": "8.3.5", "status": "affected", "version": "8.3.*", "versionType": "semver"}]}], "credits": [{"lang": "en", "type": "reporter", "value": "Marco Squarcina"}], "datePublic": "2024-04-11T17:12:00.000Z", "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<span style=\"background-color: rgb(255, 255, 255);\">Due to an incomplete fix to </span><a target=\"_blank\" rel=\"nofollow\" href=\"https://github.com/advisories/GHSA-c43m-486j-j32p\">CVE-2022-31629</a><span style=\"background-color: rgb(255, 255, 255);\">, network and same-site attackers can set a standard insecure cookie in the victim's browser which is treated as a </span><code>__Host-</code><span style=\"background-color: rgb(255, 255, 255);\"> or </span><code>__Secure-</code><span style=\"background-color: rgb(255, 255, 255);\"> cookie by PHP applications. </span><br>"}], "value": "Due to an incomplete fix to CVE-2022-31629 https://github.com/advisories/GHSA-c43m-486j-j32p , network and same-site attackers can set a standard insecure cookie in the victim's browser which is treated as a __Host-\u00a0or __Secure-\u00a0cookie by PHP applications."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "dd77f84a-d19a-4638-8c3d-a322d820ed2b", "shortName": "php", "dateUpdated": "2024-06-10T17:11:03.733Z"}, "references": [{"url": "https://github.com/php/php-src/security/advisories/GHSA-wpj3-hf5j-x4v4"}, {"url": "http://www.openwall.com/lists/oss-security/2024/04/12/11"}, {"url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html"}, {"url": "https://security.netapp.com/advisory/ntap-20240510-0008/"}], "source": {"advisory": "https://github.com/php/php-src/security/advisories/GHSA-wpj3-hf5", "discovery": "EXTERNAL"}, "title": "__Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"title": "CISA ADP Vulnrichment", "metrics": [{"other": {"type": "ssvc", "content": {"id": "CVE-2024-2756", "role": "CISA Coordinator", "options": [{"Exploitation": "poc"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "version": "2.0.3", "timestamp": "2024-04-29T17:19:19.916680Z"}}}], "affected": [{"cpes": ["cpe:2.3:a:php:archive_tar:*:*:*:*:*:*:*:*"], "vendor": "php", "product": "archive_tar", "versions": [{"status": "affected", "version": "*"}], "defaultStatus": "unknown"}], "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-06-04T17:30:06.555Z"}}, {"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-01T19:25:41.700Z"}, "title": "CVE Program Container", "references": [{"url": "https://github.com/php/php-src/security/advisories/GHSA-wpj3-hf5j-x4v4", "tags": ["x_transferred"]}, {"url": "http://www.openwall.com/lists/oss-security/2024/04/12/11", "tags": ["x_transferred"]}, {"url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html", "tags": ["x_transferred"]}, {"url": "https://security.netapp.com/advisory/ntap-20240510-0008/", "tags": ["x_transferred"]}]}]}, "dataVersion": "5.1"}