Versio.io

CVE-2022-29248

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 25-05-2022 08:15
Last modified: - 07-06-2022 08:26
Total changes: - 3

Description

Guzzle is a PHP HTTP client. Guzzle prior to versions 6.5.6 and 7.4.3 contains a vulnerability with the cookie middleware. The vulnerability is that it is not checked if the cookie domain equals the domain of the server which sets the cookie via the Set-Cookie header, allowing a malicious server to set cookies for unrelated domains. The cookie middleware is disabled by default, so most library consumers will not be affected by this issue. Only those who manually add the cookie middleware to the handler stack or construct the client with ['cookies' => true] are affected. Moreover, those who do not use the same Guzzle client to call multiple domains and have disabled redirect forwarding are not affected by this vulnerability. Guzzle versions 6.5.6 and 7.4.3 contain a patch for this issue. As a workaround, turn off the cookie middleware.

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
Low
Attack complexity
Network
Attack vector
None
Availability
High
Confidentiality
High
Integrity
None
Privileges required
Unchanged
Scope
Required
User interaction
8.1
Base score
2.8
5.2
Exploitability score
Impact score
 

Verification logic

OR
OR
vendor=guzzlephp AND product=guzzle AND versionStartIncluding=7.0.0 AND versionEndExcluding=7.4.3
vendor=guzzlephp AND product=guzzle AND versionEndExcluding=6.5.6
OR
vendor=drupal AND product=drupal AND versionStartIncluding=9.2.0 AND versionEndExcluding=9.2.20
vendor=drupal AND product=drupal AND versionStartIncluding=9.3.0 AND versionEndExcluding=9.3.14
 

Reference

 


Keywords

NVD

 

CVE-2022-29248

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.