Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2023-29337

Опубликовано: 13 июн. 2023
Источник: msrc
CVSS3: 7.1
EPSS Низкий

Описание

NuGet Client Remote Code Execution Vulnerability

FAQ

According to the CVSS metric, user interaction is required (UI:R) and privileges required is low (PR:L). What does that mean for this vulnerability?

An authorized attacker must be on the machine and monitoring for actions as a step to exploit the race condition.

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.

How could an attacker exploit this vulnerability?

A local attacker in the environment could exploit a race condition that allows a symlink attack when the victim user on the same system runs the nuget command.

According to the CVSS metric, the attack vector is network (AV:N), and privilege required is low (PR:L). What is the target used in the context of the remote code execution?

The attacker for this vulnerability could target the server accounts in an arbitrary or remote code execution. As an authenticated user, the attacker could attempt to trigger malicious code in the context of the server's account through a network call.

The privilege requirement is low because the attacker needs to be authenticated as a normal user.

Обновления

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 55%
0.00332
Низкий

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 7.1
ubuntu
около 2 лет назад

NuGet Client Remote Code Execution Vulnerability

CVSS3: 7.1
redhat
около 2 лет назад

NuGet Client Remote Code Execution Vulnerability

CVSS3: 7.1
nvd
около 2 лет назад

NuGet Client Remote Code Execution Vulnerability

CVSS3: 7.1
debian
около 2 лет назад

NuGet Client Remote Code Execution Vulnerability

CVSS3: 7.1
github
около 2 лет назад

NuGet Client Remote Code Execution Vulnerability

EPSS

Процентиль: 55%
0.00332
Низкий

7.1 High

CVSS3