8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.002 Low
EPSS
Percentile
59.6%
The Microsoft Azure Pipelines Agent running on the remote host is prior to 2.217.2. It is, therefore affected by a remote code execution vulnerability due to an integer overflow in the embedded mingit component.
Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(185951);
script_version("1.3");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/12/15");
script_cve_id("CVE-2023-36437");
script_xref(name:"IAVA", value:"2023-A-0621-S");
script_name(english:"Security Updates for Azure Pipelines Agent (November 2023)");
script_set_attribute(attribute:"synopsis", value:
"The Microsoft Azure Pipelines Agent is affected by a remote code execution vulnerability.");
script_set_attribute(attribute:"description", value:
"The Microsoft Azure Pipelines Agent running on the remote host is prior to 2.217.2. It is, therefore affected by a
remote code execution vulnerability due to an integer overflow in the embedded mingit component.
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2023-36437");
script_set_attribute(attribute:"solution", value:
"Update Microsoft Azure Pipelines Agent in accordance with vendor instructions.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-36437");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2023/11/14");
script_set_attribute(attribute:"patch_publication_date", value:"2023/02/02");
script_set_attribute(attribute:"plugin_publication_date", value:"2023/11/17");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:azure_devops_server");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows : Microsoft Bulletins");
script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("microsoft_azure_pipelines_agent_win_installed.nbin");
script_require_keys("installed_sw/Microsoft Azure Pipelines Agent");
exit(0);
}
include('vcf.inc');
var app_info = vcf::get_app_info(app:'Microsoft Azure Pipelines Agent', win_local:TRUE);
var constraints = [
{'fixed_version': '2.217.2'}
];
vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
Vendor | Product | Version | CPE |
---|---|---|---|
microsoft | azure_devops_server | cpe:/o:microsoft:azure_devops_server |
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.002 Low
EPSS
Percentile
59.6%