Security
Headlines
HeadlinesLatestCVEs

Tag

#asp.net

CVE-2023-36899

ASP.NET Elevation of Privilege Vulnerability

CVE
#vulnerability#asp.net
CVE-2023-35391

ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability

CVE-2023-35391: ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability

**What type of information could be disclosed by this vulnerability?** This vulnerability makes it possible to listen to any group or user with a specially crafted group/username. By exploiting this vulnerability, the attacker can now receive messages for group(s) that they are unauthorized to view.

CVE-2023-36899: ASP.NET Elevation of Privilege Vulnerability

**According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?** The target environment could be accidentally configured to allow the vulnerability.

CVE-2023-36899: ASP.NET Elevation of Privilege Vulnerability

**According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?** The target environment could be accidentally configured to allow the vulnerability.

CVE-2023-35391: ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability

**What type of information could be disclosed by this vulnerability?** This vulnerability makes it possible to listen to any group or user with a specially crafted group/username. By exploiting this vulnerability, the attacker can now receive messages for group(s) that they are unauthorized to view.

CVE-2023-37267: Possible admin-level access to backoffice without authentication under rare conditions

Umbraco is a ASP.NET CMS. Under rare conditions a restart of Umbraco can allow unauthorized users access to admin-level permissions. This vulnerability was patched in versions 10.6.1, 11.4.2 and 12.0.1.

CVE-2023-26564: GitHub - SyncfusionExamples/ej2-aspcore-file-provider: ej2-aspcore-file-provider

The Syncfusion EJ2 ASPCore File Provider 3ac357f is vulnerable to Models/PhysicalFileProvider.cs directory traversal. As a result, an unauthenticated attacker can list files within a directory, download any file, or upload any file to any directory accessible by the web server.

CVE-2023-26563: File system provider in EJ2 TypeScript File manager control

The Syncfusion EJ2 Node File Provider 0102271 is vulnerable to filesystem-server.js directory traversal. As a result, an unauthenticated attacker can: - On Windows, list files in any directory, read any file, delete any file, upload any file to any directory accessible by the web server. - On Linux, read any file, download any directory, delete any file, upload any file to any directory accessible by the web server.

GHSA-25c8-p796-jg6r: Microsoft Security Advisory CVE-2023-33170: .NET Security Feature Bypass Vulnerability

# Microsoft Security Advisory CVE-2023-33170: .NET Security Feature Bypass Vulnerability ## <a name="executive-summary"></a>Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in ASP.NET Core 2.1 and above. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exist in ASP.NET Core applications where account lockout maximum failed attempts may not be immediately updated, allowing an attacker to try more passwords. ## Discussion Discussion for this issue can be found at https://github.com/dotnet/aspnetcore/issues/49334 ### <a name="mitigation-factors"></a>Mitigation factors Microsoft has not identified any mitigating factors for this vulnerability. ## <a name="affected-software"></a>Affected software * Any ASP.NET 7.0 application running on .NET 7.0.8 or earlier. * Any ASP.NET 6.0 application running on .NET 6.0.19 or earlier. * Any ASP.N...