8.1
CVSSv3

CVE-2022-29248

Published: 25/05/2022 Updated: 21/11/2024

Vulnerability Summary

Guzzle is a PHP HTTP client. Guzzle prior to versions 6.5.6 and 7.4.3 contains a vulnerability with the cookie middleware. The vulnerability is that it is not checked if the cookie domain equals the domain of the server which sets the cookie via the Set-Cookie header, allowing a malicious server to set cookies for unrelated domains. The cookie middleware is disabled by default, so most library consumers will not be affected by this issue. Only those who manually add the cookie middleware to the handler stack or construct the client with ['cookies' => true] are affected. Moreover, those who do not use the same Guzzle client to call multiple domains and have disabled redirect forwarding are not affected by this vulnerability. Guzzle versions 6.5.6 and 7.4.3 contain a patch for this issue. As a workaround, turn off the cookie middleware.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

guzzlephp guzzle

drupal drupal

debian debian linux 11.0

Vendor Advisories

Debian Bug report logs - #1011636 guzzle: [CVE-2022-29248] Cross-domain cookie leakage Package: php-guzzlehttp-guzzle; Maintainer for php-guzzlehttp-guzzle is Katharina Drexel <katharinadrexel@bfhch>; Source for php-guzzlehttp-guzzle is src:guzzle (PTS, buildd, popcon) Reported by: David Prévot <taffit@debianorg> ...
Multiple security issues were discovered in MediaWiki, a website engine for collaborative work, which could result in restriction bypass, information leaks, cross-site scripting or denial of service For the stable distribution (bullseye), these problems have been fixed in version 1:1358-1~deb11u1 We recommend that you upgrade your mediawiki pac ...
Severity Unknown Remote Unknown Type Unknown Description AVG-2823 mediawiki 1382-1 1383-1 Unknown Fixed githubcom/guzzle/guzzle/security/advisories/GHSA-cwmx-hcrq-mhc3 phabricatorwikimed ...