Описание
.NET, Visual Studio, and Build Tools for Visual Studio Spoofing Vulnerability
External control of file name or path in .NET, Visual Studio, and Build Tools for Visual Studio allows an authorized attacker to perform spoofing over a network.
FAQ
According to the CVSS metric, user interaction is required (UI:R) and privileges required is low (PR:L). What does that mean for this vulnerability?
An authorized attacker with standard user privileges could place a malicious file and then wait for the privileged victim to run the calling command.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Microsoft Visual Studio 2022 version 17.8 | ||
Microsoft Visual Studio 2022 version 17.10 | ||
.NET 8.0 installed on Windows | ||
.NET 8.0 installed on Linux | ||
.NET 8.0 installed on Mac OS | ||
.NET 9.0 installed on Linux | ||
.NET 9.0 installed on Mac OS | ||
.NET 9.0 installed on Windows | ||
Microsoft Visual Studio 2022 version 17.12 | ||
Microsoft Visual Studio 2022 version 17.13 |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
DOS
EPSS
8 High
CVSS3
Связанные уязвимости
External control of file name or path in .NET, Visual Studio, and Build Tools for Visual Studio allows an authorized attacker to perform spoofing over a network.
External control of file name or path in .NET, Visual Studio, and Build Tools for Visual Studio allows an authorized attacker to perform spoofing over a network.
External control of file name or path in .NET, Visual Studio, and Build Tools for Visual Studio allows an authorized attacker to perform spoofing over a network.
Microsoft.Build.Tasks.Core .NET Spoofing Vulnerability
EPSS
8 High
CVSS3