CVE-2022-31629
28.09.2022, 23:15
In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the victim's browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications.Enginsight
Vendor | Product | Version |
---|---|---|
php | php | 𝑥 < 7.4.31 |
php | php | 8.0.0 ≤ 𝑥 < 8.0.24 |
php | php | 8.1.0 ≤ 𝑥 < 8.1.11 |
debian | debian_linux | 10.0 |
debian | debian_linux | 11.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
php5 |
| ||||||||||||||||||
php7.0 |
| ||||||||||||||||||
php7.2 |
| ||||||||||||||||||
php7.4 |
| ||||||||||||||||||
php8.1 |
|
Common Weakness Enumeration
- CWE-20 - Improper Input ValidationThe product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
- CWE-1284 - Improper Validation of Specified Quantity in InputThe product receives input that is expected to specify a quantity (such as size or length), but it does not validate or incorrectly validates that the quantity has the required properties.
References