{"id":"CVE-2020-7070","details":"In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information.","aliases":["BIT-libphp-2020-7070","BIT-php-2020-7070","BIT-php-min-2020-7070"],"modified":"2026-04-16T04:34:15.498100906Z","published":"2020-10-02T15:15:12.747Z","related":["ALSA-2021:4213","SUSE-SU-2020:14516-1","SUSE-SU-2020:2894-1","SUSE-SU-2020:2896-1","SUSE-SU-2020:2920-1","SUSE-SU-2020:2941-1","SUSE-SU-2020:2943-1","SUSE-SU-2020:2997-1","SUSE-SU-2022:4067-1","SUSE-SU-2022:4068-1","SUSE-SU-2022:4069-1","openSUSE-SU-2020:1703-1","openSUSE-SU-2020:1767-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RRU57N3OSYZPOMFWPRDNVH7EMYOTSZ66/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EVDN7D3IB4EAI4D3ZOM2OJKQ5SD7K4E/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2J3ZZDHCSX65T5QWV4AHBN7MOJXBEKG/"},{"type":"ADVISORY","url":"http://cve.circl.lu/cve/CVE-2020-8184"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00045.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00008.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4583-1/"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2021-14"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20201016-0001/"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00067.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202012-16"},{"type":"ADVISORY","url":"https://www.debian.org/security/2021/dsa-4856"},{"type":"REPORT","url":"https://bugs.php.net/bug.php?id=79699"},{"type":"EVIDENCE","url":"https://hackerone.com/reports/895727"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"8148cbb78841c8ec0759c0836e7f35dec799d300"},{"fixed":"05eb475499359800a9c698f1759e442042c4f841"},{"introduced":"52ace952a1b65ca80fc2617f11c2fa6dd03f51bd"},{"fixed":"251b1fe177af320256c901e40c9e5fce18316d13"},{"introduced":"3c7824e16ec4c3cee417262445d2c2b66531c10f"},{"fixed":"e1daa19750730b5d94ed2525289d869a4d3cff2b"}],"database_specific":{"versions":[{"introduced":"7.2.0"},{"fixed":"7.2.34"},{"introduced":"7.3.0"},{"fixed":"7.3.23"},{"introduced":"7.4.0"},{"fixed":"7.4.11"}]}}],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"32"}]},{"events":[{"introduced":"0"},{"last_affected":"33"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.2"}]},{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"20.04"}]},{"events":[{"introduced":"0"},{"fixed":"5.19.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-7070.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}]}