{"id":"BIT-libphp-2024-2756","summary":"__Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix","details":"Due to an incomplete fix to  CVE-2022-31629 https://github.com/advisories/GHSA-c43m-486j-j32p , network and same-site attackers can set a standard insecure cookie in the victim's browser which is treated as a __Host- or __Secure- cookie by PHP applications.","aliases":["BIT-php-2024-2756","BIT-php-min-2024-2756","CVE-2024-2756"],"modified":"2025-11-06T13:25:46.476Z","published":"2025-08-11T13:54:12.793Z","database_specific":{"severity":"Medium","cpes":["cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"]},"references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/04/12/11"},{"type":"WEB","url":"https://github.com/php/php-src/security/advisories/GHSA-wpj3-hf5j-x4v4"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-2756"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20240510-0008/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJZK3X6B7FBE32FETDSMRLJXTFTHKWSY/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGWIK3HMBACERGB4TSBB2JUOMPYY2VKY/"}],"affected":[{"package":{"name":"libphp","ecosystem":"Bitnami","purl":"pkg:bitnami/libphp"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"8.1.28"},{"introduced":"8.2.0"},{"fixed":"8.2.18"},{"introduced":"8.3.0"},{"fixed":"8.3.5"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/libphp/BIT-libphp-2024-2756.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}]}],"schema_version":"1.7.3"}