Lucene search

K
githubGitHub Advisory DatabaseGHSA-PX8H-6QXV-M22Q
HistoryFeb 15, 2023 - 3:37 p.m.

Incorrect parsing of nameless cookies leads to __Host- cookies bypass

2023-02-1515:37:03
CWE-20
GitHub Advisory Database
github.com
105
incorrect parsing
nameless cookies
security bypass
browsers
subdomain
exploit
vulnerable
application
cookie parsing
werkzeug
vulnerable browser
malicious subdomain

3.5 Low

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

21.7%

Browsers may allow “nameless” cookies that look like =value instead of key=value. A vulnerable browser may allow a compromised application on an adjacent subdomain to exploit this to set a cookie like =__Host-test=bad for another subdomain.

Werkzeug <= 2.2.2 will parse the cookie =__Host-test=bad as __Host-test=bad. If a Werkzeug application is running next to a vulnerable or malicious subdomain which sets such a cookie using a vulnerable browser, the Werkzeug application will see the bad cookie value but the valid cookie key.

Affected configurations

Vulners
Node
palletsprojectswerkzeugRange<2.2.3
CPENameOperatorVersion
werkzeuglt2.2.3

3.5 Low

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

21.7%