Lucene search

K
openvasCopyright (C) 2023 Greenbone AGOPENVAS:1361412562310832386
HistoryAug 09, 2023 - 12:00 a.m.

.NET Core Multiple Vulnerabilities (KB5029688, KB5029689) - Windows

2023-08-0900:00:00
Copyright (C) 2023 Greenbone AG
plugins.openvas.org
4
.net core
windows
rce
vulnerabilities
kestrel
upgrades

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.008 Low

EPSS

Percentile

81.1%

.NET Core prone to security feature bypass
and elevation of privilege vulnerabilities.

# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:microsoft:asp.net_core";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.832386");
  script_version("2023-10-13T05:06:10+0000");
  script_xref(name:"CISA", value:"Known Exploited Vulnerability (KEV) catalog");
  script_xref(name:"URL", value:"https://www.cisa.gov/known-exploited-vulnerabilities-catalog");
  script_cve_id("CVE-2023-35390", "CVE-2023-38180", "CVE-2023-35391", "CVE-2023-38178");
  script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"2023-10-13 05:06:10 +0000 (Fri, 13 Oct 2023)");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2023-08-08 18:33:00 +0000 (Tue, 08 Aug 2023)");
  script_tag(name:"creation_date", value:"2023-08-09 10:40:13 +0530 (Wed, 09 Aug 2023)");
  script_name(".NET Core Multiple Vulnerabilities (KB5029688, KB5029689) - Windows");

  script_tag(name:"summary", value:".NET Core prone to security feature bypass
  and elevation of privilege vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present
  on the target host.");

  script_tag(name:"insight", value:"Multiple flaws exist due to,

  - A vulnerability exists when some dotnet commands are used in
    directories with weaker permissions which can result in remote code execution.

  - A vulnerability exists in Kestrel where, on detecting a potentially malicious
    client, Kestrel will sometimes fail to disconnect it, resulting in denial of service.");

  script_tag(name:"impact", value:"Successful exploitation would allow an attacker
  to bypass security restrictions, achieve cross-session/cross-user elevation of
  privilege (EoP) and code execution.");

  script_tag(name:"affected", value:".NET Core runtime 6.0 before 6.0.21, 7.0 before
  7.0.10 and .NET Core SDK before 6.0.121, 6.0.316, 7.0.400.");

  script_tag(name:"solution", value:"Upgrade to versions 6.0.21 or 7.0.10 or later or
  upgrade .NET Core SDK to versions 6.0.121 or 6.0.316 or
  7.0.400 or later.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"registry");
  script_xref(name:"URL", value:"https://github.com/dotnet/core/blob/main/release-notes/6.0/6.0.21/6.0.21.md");
  script_xref(name:"URL", value:"https://github.com/dotnet/core/blob/main/release-notes/7.0/7.0.10/7.0.10.md");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2023 Greenbone AG");
  script_family("Windows");
  script_dependencies("gb_asp_dotnet_core_detect_win.nasl");
  script_mandatory_keys("ASP.NET/Core/Ver");
  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE))
  exit(0);

vers = infos["version"];
path = infos["location"];

if(!vers || vers !~ "^[6|7]\.0")
  exit(0);

if(!corerunVer = get_kb_item(".NET/Core/Runtime/Ver")) {
  if(!codesdkVer = get_kb_item(".NET/Core/SDK/Ver")) {
    exit(0);
  }
}

if(corerunVer) {
  if(version_in_range(version:corerunVer, test_version:"6.0", test_version2:"6.0.20")) {
    fix = "6.0.21 or later";
  } else if(version_in_range(version:corerunVer, test_version:"7.0", test_version2:"7.0.10")) {
      fix = "7.0.9 or later";
  }
}

else if(codesdkVer) {
  if(version_in_range(version:codesdkVer, test_version:"6.0", test_version2:"6.0.120") ||
     version_in_range(version:codesdkVer, test_version:"6.0.300", test_version2:"6.0.315")) {
    fix1 = "6.0.121 or 6.0.316 or later";
  }
  else if(version_in_range(version:codesdkVer, test_version:"7.0.300", test_version2:"7.0.399")) {
    fix1 = "7.0.400 or later";
  }
}

if(fix) {
  report = report_fixed_ver(installed_version:"ASP .NET Core With Microsoft .NET Core runtimes " + corerunVer,
               fixed_version:"ASP .NET Core With Microsoft .NET Core runtimes version " + fix, install_path:path);
  security_message(port:0, data:report);
  exit(0);
}
else if(fix1) {
  report = report_fixed_ver(installed_version:"ASP .NET Core With Microsoft .NET Core SDK " + codesdkVer,
               fixed_version:"ASP .NET Core With Microsoft .NET Core SDK version " + fix1, install_path:path);
  security_message(port:0, data:report);
  exit(0);
}

exit(99);

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.008 Low

EPSS

Percentile

81.1%