Security Bypass Affecting microsoft.owin package, versions [,4.1.1)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.14% (50th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DOTNET-MICROSOFTOWIN-1019387
  • published9 Sept 2020
  • disclosed8 Sept 2020
  • creditMatt Langlois of Github Security Team

Introduced: 8 Sep 2020

CVE-2020-1045  (opens in a new tab)
CWE-358  (opens in a new tab)

How to fix?

Upgrade Microsoft.Owin to version 4.1.1 or higher.

Overview

Microsoft.Owin is a Provides a set of helper types and abstractions for simplifying the creation of OWIN components.

Affected versions of this package are vulnerable to Security Bypass. The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded. The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names. This CVE also affects Microsoft.Owin due to it using a similar cookie parsing mechanism.

CVSS Scores

version 3.1