Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-35333 (GCVE-0-2023-35333)
Vulnerability from cvelistv5 – Published: 2023-07-11 17:56 – Updated: 2025-01-01 01:52- CWE-94 - Improper Control of Generation of Code ('Code Injection')
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Microsoft | PandocUpload |
Affected:
1.0.0 , < 1.0.1
(custom)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-35333",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-29T14:53:02.146739Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:18:35.040Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T16:23:59.708Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "MediaWiki PandocUpload Extension Remote Code Execution Vulnerability",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35333"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"platforms": [
"Unknown"
],
"product": "PandocUpload",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "1.0.1",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:media_wiki_extensions_pandoc_upload:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.1",
"versionStartIncluding": "1.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"datePublic": "2023-07-11T07:00:00.000Z",
"descriptions": [
{
"lang": "en-US",
"value": "MediaWiki PandocUpload Extension Remote Code Execution Vulnerability"
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en-US",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-94",
"description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"lang": "en-US",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-01-01T01:52:19.920Z",
"orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"shortName": "microsoft"
},
"references": [
{
"name": "MediaWiki PandocUpload Extension Remote Code Execution Vulnerability",
"tags": [
"vendor-advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35333"
}
],
"title": "MediaWiki PandocUpload Extension Remote Code Execution Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"assignerShortName": "microsoft",
"cveId": "CVE-2023-35333",
"datePublished": "2023-07-11T17:56:10.444Z",
"dateReserved": "2023-06-14T23:09:47.620Z",
"dateUpdated": "2025-01-01T01:52:19.920Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:pandocupload:*:*:*:*:*:mediawiki:*:*\", \"versionEndExcluding\": \"1.0.1\", \"matchCriteriaId\": \"DAD6EF21-122B-4077-A09F-0063D1BB2551\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"MediaWiki PandocUpload Extension Remote Code Execution Vulnerability\"}]",
"id": "CVE-2023-35333",
"lastModified": "2024-11-21T08:08:13.673",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"secure@microsoft.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 5.9}]}",
"published": "2023-07-11T18:15:18.360",
"references": "[{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35333\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35333\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"secure@microsoft.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-94\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-35333\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2023-07-11T18:15:18.360\",\"lastModified\":\"2024-11-21T08:08:13.673\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"MediaWiki PandocUpload Extension Remote Code Execution Vulnerability\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:pandocupload:*:*:*:*:*:mediawiki:*:*\",\"versionEndExcluding\":\"1.0.1\",\"matchCriteriaId\":\"DAD6EF21-122B-4077-A09F-0063D1BB2551\"}]}]}],\"references\":[{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35333\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35333\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35333\", \"name\": \"MediaWiki PandocUpload Extension Remote Code Execution Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T16:23:59.708Z\"}}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-35333\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-05-29T14:53:02.146739Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-29T14:53:12.527Z\"}, \"title\": \"CISA ADP Vulnrichment\"}], \"cna\": {\"title\": \"MediaWiki PandocUpload Extension Remote Code Execution Vulnerability\", \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C\"}, \"scenarios\": [{\"lang\": \"en-US\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Microsoft\", \"product\": \"PandocUpload\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0.0\", \"lessThan\": \"1.0.1\", \"versionType\": \"custom\"}], \"platforms\": [\"Unknown\"]}], \"datePublic\": \"2023-07-11T07:00:00+00:00\", \"references\": [{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35333\", \"name\": \"MediaWiki PandocUpload Extension Remote Code Execution Vulnerability\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"MediaWiki PandocUpload Extension Remote Code Execution Vulnerability\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"type\": \"CWE\", \"cweId\": \"CWE-94\", \"description\": \"CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:microsoft:media_wiki_extensions_pandoc_upload:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"1.0.1\", \"versionStartIncluding\": \"1.0.0\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"shortName\": \"microsoft\", \"dateUpdated\": \"2025-01-01T01:52:19.920Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-35333\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-01-01T01:52:19.920Z\", \"dateReserved\": \"2023-06-14T23:09:47.620Z\", \"assignerOrgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"datePublished\": \"2023-07-11T17:56:10.444Z\", \"assignerShortName\": \"microsoft\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
BDU:2023-03741
Vulnerability from fstec - Published: 11.07.2023{
"CVSS 2.0": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Microsoft Corp",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 1.0.1 (PandocUpload)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35333",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "11.07.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "18.07.2023",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "18.07.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-03741",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2023-35333",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "PandocUpload",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u044f \u0433\u0438\u043f\u0435\u0440\u0442\u0435\u043a\u0441\u0442\u043e\u0432\u043e\u0439 \u0441\u0440\u0435\u0434\u044b MediaWiki PandocUpload, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-20)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u044f \u0433\u0438\u043f\u0435\u0440\u0442\u0435\u043a\u0441\u0442\u043e\u0432\u043e\u0439 \u0441\u0440\u0435\u0434\u044b MediaWiki PandocUpload \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u0440\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u0430\u0440\u0433\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u043e\u0431\u043e\u043b\u043e\u0447\u043a\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u043f\u0443\u0442\u0435\u043c \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35333\nhttps://www.cybersecurity-help.cz/vdb/SB2023071276",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-20",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,8)"
}
GHSA-9GV2-6FHV-JGC6
Vulnerability from github – Published: 2023-07-11 18:31 – Updated: 2024-04-04 05:59MediaWiki PandocUpload Extension Remote Code Execution Vulnerability
{
"affected": [],
"aliases": [
"CVE-2023-35333"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-07-11T18:15:18Z",
"severity": "HIGH"
},
"details": "MediaWiki PandocUpload Extension Remote Code Execution Vulnerability",
"id": "GHSA-9gv2-6fhv-jgc6",
"modified": "2024-04-04T05:59:11Z",
"published": "2023-07-11T18:31:27Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35333"
},
{
"type": "WEB",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35333"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2023-35333
Vulnerability from fkie_nvd - Published: 2023-07-11 18:15 - Updated: 2024-11-21 08:087.5 (High) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35333 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35333 | Patch, Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| microsoft | pandocupload | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:pandocupload:*:*:*:*:*:mediawiki:*:*",
"matchCriteriaId": "DAD6EF21-122B-4077-A09F-0063D1BB2551",
"versionEndExcluding": "1.0.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "MediaWiki PandocUpload Extension Remote Code Execution Vulnerability"
}
],
"id": "CVE-2023-35333",
"lastModified": "2024-11-21T08:08:13.673",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "secure@microsoft.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-07-11T18:15:18.360",
"references": [
{
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35333"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35333"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "secure@microsoft.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
MSRC_CVE-2023-35333
Vulnerability from csaf_microsoft - Published: 2023-07-11 07:00 - Updated: 2023-07-11 07:00{
"document": {
"acknowledgments": [
{
"names": [
"\u003ca href=\"https://blog.bawolff.net/\"\u003ebawolff\u003c/a\u003e"
]
}
],
"aggregate_severity": {
"namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
},
{
"category": "general",
"text": "Required. The vulnerability documented by this CVE requires customer action to resolve.",
"title": "Customer Action"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2023-35333 MediaWiki PandocUpload Extension Remote Code Execution Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35333"
},
{
"category": "self",
"summary": "CVE-2023-35333 MediaWiki PandocUpload Extension Remote Code Execution Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/2023/msrc_cve-2023-35333.json"
},
{
"category": "external",
"summary": "Microsoft Exploitability Index",
"url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "MediaWiki PandocUpload Extension Remote Code Execution Vulnerability",
"tracking": {
"current_release_date": "2023-07-11T07:00:00.000Z",
"generator": {
"date": "2025-01-01T01:51:50.860Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2023-35333",
"initial_release_date": "2023-07-11T07:00:00.000Z",
"revision_history": [
{
"date": "2023-07-11T07:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.0.1",
"product": {
"name": "PandocUpload \u003c1.0.1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "1.0.1",
"product": {
"name": "PandocUpload 1.0.1",
"product_id": "12209"
}
}
],
"category": "product_name",
"name": "PandocUpload"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-35333",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "general",
"text": "Microsoft",
"title": "Assigning CNA"
},
{
"category": "faq",
"text": "An authenticated attacker could exploit this vulnerability by uploading a file with the destination name as a malicious payload due to shell arguments not being properly escaped. When successfully exploited this could allow the malicious actor to perform remote code execution.",
"title": "How could an attacker exploit this vulnerability?"
},
{
"category": "faq",
"text": "The attacker for this vulnerability could target the server accounts in an arbitrary or remote code execution. As an authenticated user, the attacker could attempt to trigger malicious code in the context of the server\u0027s account through a network call.\nThe privilege requirement is low because the attacker needs to be authenticated as a normal user.",
"title": "According to the CVSS metric, the attack vector is network (AV:N), and privilege required is low (PR:L). What is the target used in the context of the remote code execution?"
}
],
"product_status": {
"fixed": [
"12209"
],
"known_affected": [
"1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-35333 MediaWiki PandocUpload Extension Remote Code Execution Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35333"
},
{
"category": "self",
"summary": "CVE-2023-35333 MediaWiki PandocUpload Extension Remote Code Execution Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35333"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2023-07-11T07:00:00.000Z",
"details": "1.0.1:Security Update:https://github.com/microsoft/MediaWiki-Extensions",
"product_ids": [
"1"
],
"url": "https://github.com/microsoft/MediaWiki-Extensions"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"exploitCodeMaturity": "UNPROVEN",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"remediationLevel": "OFFICIAL_FIX",
"reportConfidence": "CONFIRMED",
"scope": "UNCHANGED",
"temporalScore": 7.7,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Remote Code Execution"
},
{
"category": "exploit_status",
"details": "Exploited:No;Latest Software Release:Exploitation Less Likely"
}
],
"title": "MediaWiki PandocUpload Extension Remote Code Execution Vulnerability"
}
]
}
CERTFR-2023-AVI-0536
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Microsoft. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la fonctionnalité de sécurité, une usurpation d'identité, une exécution de code arbitraire à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.0 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.2 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.6 | ||
| Microsoft | N/A | Microsoft Power Apps (online) | ||
| Microsoft | N/A | PandocUpload | ||
| Microsoft | N/A | Raw Image Extension | ||
| Microsoft | N/A | VP9 Video Extensions | ||
| Microsoft | N/A | Microsoft Malware Protection Engine | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.1 | ||
| Microsoft | N/A | Microsoft 365 Apps pour Enterprise pour systèmes 32 bits | ||
| Microsoft | N/A | Microsoft 365 Apps pour Enterprise pour 64 bits Systems | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.4 | ||
| Microsoft | N/A | Visual Studio Code - GitHub Pull Requests and Issues Extension | ||
| Microsoft | N/A | Mono 6.12.0 | ||
| Microsoft | N/A | Paint 3D | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.0 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Visual Studio 2022 version 17.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Power Apps (online)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "PandocUpload",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Raw Image Extension",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "VP9 Video Extensions",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Malware Protection Engine",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft 365 Apps pour Enterprise pour syst\u00e8mes 32 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft 365 Apps pour Enterprise pour 64 bits Systems",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Visual Studio Code - GitHub Pull Requests and Issues Extension",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Mono 6.12.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Paint 3D",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-33151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33151"
},
{
"name": "CVE-2023-33148",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33148"
},
{
"name": "CVE-2023-33150",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33150"
},
{
"name": "CVE-2023-32052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32052"
},
{
"name": "CVE-2023-33127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33127"
},
{
"name": "CVE-2023-33170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33170"
},
{
"name": "CVE-2023-35335",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35335"
},
{
"name": "CVE-2023-35374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35374"
},
{
"name": "CVE-2023-33156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33156"
},
{
"name": "CVE-2023-33171",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33171"
},
{
"name": "CVE-2023-32047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32047"
},
{
"name": "CVE-2023-36872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36872"
},
{
"name": "CVE-2023-32051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32051"
},
{
"name": "CVE-2023-33162",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33162"
},
{
"name": "CVE-2023-35311",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35311"
},
{
"name": "CVE-2023-33152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33152"
},
{
"name": "CVE-2023-33149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33149"
},
{
"name": "CVE-2023-35333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35333"
},
{
"name": "CVE-2023-33158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33158"
},
{
"name": "CVE-2023-36867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36867"
},
{
"name": "CVE-2023-33161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33161"
},
{
"name": "CVE-2023-35373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35373"
},
{
"name": "CVE-2023-33153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33153"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33153 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33153"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33127 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33127"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35333 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35333"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-32051 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32051"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36872 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36872"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35374 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35374"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33151 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33151"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33162 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33162"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33156 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33156"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-32047 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32047"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35335 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35335"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33152 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33152"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33148 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33148"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33158 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33158"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33171 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33171"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33150 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33150"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33170 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33170"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-32052 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32052"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35373 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35373"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33161 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33161"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35311 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35311"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33149 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33149"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36867 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36867"
}
],
"reference": "CERTFR-2023-AVI-0536",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-07-12T00:00:00.000000"
},
{
"description": "Correction de l\u0027identifiant de l\u0027avis.",
"revision_date": "2023-07-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Usurpation d\u0027identit\u00e9"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Microsoft\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un\ncontournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9, une usurpation\nd\u0027identit\u00e9, une ex\u00e9cution de code arbitraire \u00e0 distance et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
CERTFR-2023-AVI-0536
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Microsoft. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la fonctionnalité de sécurité, une usurpation d'identité, une exécution de code arbitraire à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.0 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.2 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.6 | ||
| Microsoft | N/A | Microsoft Power Apps (online) | ||
| Microsoft | N/A | PandocUpload | ||
| Microsoft | N/A | Raw Image Extension | ||
| Microsoft | N/A | VP9 Video Extensions | ||
| Microsoft | N/A | Microsoft Malware Protection Engine | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.1 | ||
| Microsoft | N/A | Microsoft 365 Apps pour Enterprise pour systèmes 32 bits | ||
| Microsoft | N/A | Microsoft 365 Apps pour Enterprise pour 64 bits Systems | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.4 | ||
| Microsoft | N/A | Visual Studio Code - GitHub Pull Requests and Issues Extension | ||
| Microsoft | N/A | Mono 6.12.0 | ||
| Microsoft | N/A | Paint 3D | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.0 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Visual Studio 2022 version 17.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Power Apps (online)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "PandocUpload",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Raw Image Extension",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "VP9 Video Extensions",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Malware Protection Engine",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft 365 Apps pour Enterprise pour syst\u00e8mes 32 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft 365 Apps pour Enterprise pour 64 bits Systems",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Visual Studio Code - GitHub Pull Requests and Issues Extension",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Mono 6.12.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Paint 3D",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-33151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33151"
},
{
"name": "CVE-2023-33148",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33148"
},
{
"name": "CVE-2023-33150",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33150"
},
{
"name": "CVE-2023-32052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32052"
},
{
"name": "CVE-2023-33127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33127"
},
{
"name": "CVE-2023-33170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33170"
},
{
"name": "CVE-2023-35335",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35335"
},
{
"name": "CVE-2023-35374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35374"
},
{
"name": "CVE-2023-33156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33156"
},
{
"name": "CVE-2023-33171",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33171"
},
{
"name": "CVE-2023-32047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32047"
},
{
"name": "CVE-2023-36872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36872"
},
{
"name": "CVE-2023-32051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32051"
},
{
"name": "CVE-2023-33162",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33162"
},
{
"name": "CVE-2023-35311",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35311"
},
{
"name": "CVE-2023-33152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33152"
},
{
"name": "CVE-2023-33149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33149"
},
{
"name": "CVE-2023-35333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35333"
},
{
"name": "CVE-2023-33158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33158"
},
{
"name": "CVE-2023-36867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36867"
},
{
"name": "CVE-2023-33161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33161"
},
{
"name": "CVE-2023-35373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35373"
},
{
"name": "CVE-2023-33153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33153"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33153 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33153"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33127 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33127"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35333 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35333"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-32051 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32051"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36872 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36872"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35374 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35374"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33151 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33151"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33162 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33162"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33156 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33156"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-32047 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32047"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35335 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35335"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33152 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33152"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33148 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33148"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33158 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33158"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33171 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33171"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33150 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33150"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33170 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33170"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-32052 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32052"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35373 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35373"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33161 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33161"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-35311 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35311"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-33149 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33149"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36867 du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36867"
}
],
"reference": "CERTFR-2023-AVI-0536",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-07-12T00:00:00.000000"
},
{
"description": "Correction de l\u0027identifiant de l\u0027avis.",
"revision_date": "2023-07-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Usurpation d\u0027identit\u00e9"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Microsoft\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un\ncontournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9, une usurpation\nd\u0027identit\u00e9, une ex\u00e9cution de code arbitraire \u00e0 distance et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 11 juillet 2023",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
WID-SEC-W-2023-1722
Vulnerability from csaf_certbund - Published: 2023-07-11 22:00 - Updated: 2023-08-10 22:00In Microsoft Visual Studio 2022, Microsoft Visual Studio Code und Microsoft .NET Framework existieren mehrere Schwachstellen. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren.
In Microsoft Visual Studio 2022, Microsoft Visual Studio Code und Microsoft .NET Framework existieren mehrere Schwachstellen. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren.
In Microsoft Visual Studio 2022, Microsoft Visual Studio Code und Microsoft .NET Framework existieren mehrere Schwachstellen. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren.
In Microsoft Visual Studio 2022, Microsoft Visual Studio Code und Microsoft .NET Framework existieren mehrere Schwachstellen. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren.
In Microsoft Visual Studio 2022, Microsoft Visual Studio Code und Microsoft .NET Framework existieren mehrere Schwachstellen. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Microsoft Visual Studio ist eine integrierte Entwicklungsumgebung f\u00fcr Hochsprachen.\r\nVisual Studio Code ist ein Quelltext-Editor von Microsoft. \r\nMicrosoft .NET Framework ist eine Komponente des Microsoft Windows-Betriebssystems, das die Erstellung und Ausf\u00fchrung von Softwareanwendungen und Webdiensten erm\u00f6glicht. Es beinhaltet sowohl eine Laufzeitumgebung als auch ein Framework von Klassenbibliotheken (APIs), u. a. f\u00fcr die Programmiersprache ASP (ASP.NET), den Datenzugriff (ADO.NET), intelligente Clientanwendungen (Windows Forms) und weitere.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentisierter oder anonymer Angreifer kann mehrere Schwachstellen in Microsoft Visual Studio 2022, Microsoft Visual Studio Code und Microsoft .NET Framework ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- MacOS X\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1722 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1722.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1722 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1722"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-4058 vom 2023-08-10",
"url": "https://oss.oracle.com/pipermail/el-errata/2023-August/014361.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-4059 vom 2023-08-10",
"url": "https://oss.oracle.com/pipermail/el-errata/2023-August/014362.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-4057 vom 2023-08-10",
"url": "https://oss.oracle.com/pipermail/el-errata/2023-August/014278.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4448 vom 2023-08-03",
"url": "https://access.redhat.com/errata/RHSA-2023:4448"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4449 vom 2023-08-03",
"url": "https://access.redhat.com/errata/RHSA-2023:4449"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-4060 vom 2023-07-17",
"url": "https://linux.oracle.com/errata/ELSA-2023-4060.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4058 vom 2023-07-13",
"url": "https://access.redhat.com/errata/RHSA-2023:4058"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2023-18264C31F6 vom 2023-07-14",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-18264c31f6"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2023-4A48637C3F vom 2023-07-14",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-4a48637c3f"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2023-D25E798D6C vom 2023-07-14",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-d25e798d6c"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2023-FEDA45BC39 vom 2023-07-14",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-feda45bc39"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4059 vom 2023-07-13",
"url": "https://access.redhat.com/errata/RHSA-2023:4059"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4060 vom 2023-07-13",
"url": "https://access.redhat.com/errata/RHSA-2023:4060"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4061 vom 2023-07-13",
"url": "https://access.redhat.com/errata/RHSA-2023:4061"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4057 vom 2023-07-13",
"url": "https://access.redhat.com/errata/RHSA-2023:4057"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6217-1 vom 2023-07-11",
"url": "https://ubuntu.com/security/notices/USN-6217-1"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2023-07-11",
"url": "https://msrc.microsoft.com/update-guide"
}
],
"source_lang": "en-US",
"title": "Microsoft Developer Tools: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-08-10T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:55:19.277+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-1722",
"initial_release_date": "2023-07-11T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-07-11T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-07-13T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat und Fedora aufgenommen"
},
{
"date": "2023-07-17T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-08-02T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-08-10T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Oracle Linux aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Microsoft .NET Framework 6.0",
"product": {
"name": "Microsoft .NET Framework 6.0",
"product_id": "T021995",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:.net_framework:6.0"
}
}
},
{
"category": "product_name",
"name": "Microsoft .NET Framework 7.0",
"product": {
"name": "Microsoft .NET Framework 7.0",
"product_id": "T027170",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:.net_framework:7.0"
}
}
}
],
"category": "product_name",
"name": ".NET Framework"
},
{
"branches": [
{
"category": "product_name",
"name": "Microsoft Visual Studio 2022 version 17.0",
"product": {
"name": "Microsoft Visual Studio 2022 version 17.0",
"product_id": "T026754",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:visual_studio_2022:version_17.0"
}
}
},
{
"category": "product_name",
"name": "Microsoft Visual Studio 2022 version 17.2",
"product": {
"name": "Microsoft Visual Studio 2022 version 17.2",
"product_id": "T028102",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:visual_studio_2022:version_17.2"
}
}
},
{
"category": "product_name",
"name": "Microsoft Visual Studio 2022 version 17.4",
"product": {
"name": "Microsoft Visual Studio 2022 version 17.4",
"product_id": "T028103",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:visual_studio_2022:version_17.4"
}
}
},
{
"category": "product_name",
"name": "Microsoft Visual Studio 2022 version 17.6",
"product": {
"name": "Microsoft Visual Studio 2022 version 17.6",
"product_id": "T028105",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:visual_studio_2022:version_17.6"
}
}
}
],
"category": "product_name",
"name": "Visual Studio 2022"
},
{
"branches": [
{
"category": "product_name",
"name": "Microsoft Visual Studio Code - GitHub Pull Requests and Issues Extension",
"product": {
"name": "Microsoft Visual Studio Code - GitHub Pull Requests and Issues Extension",
"product_id": "T021299",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:visual_studio_code:wsl_extension"
}
}
},
{
"category": "product_name",
"name": "Microsoft Visual Studio Code PandocUpload",
"product": {
"name": "Microsoft Visual Studio Code PandocUpload",
"product_id": "T028505",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:visual_studio_code:pandocupload"
}
}
},
{
"category": "product_name",
"name": "Microsoft Visual Studio Code Mono 6.12.0",
"product": {
"name": "Microsoft Visual Studio Code Mono 6.12.0",
"product_id": "T028506",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:visual_studio_code:mono_6.12.0"
}
}
}
],
"category": "product_name",
"name": "Visual Studio Code"
}
],
"category": "vendor",
"name": "Microsoft"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-36867",
"notes": [
{
"category": "description",
"text": "In Microsoft Visual Studio 2022, Microsoft Visual Studio Code und Microsoft .NET Framework existieren mehrere Schwachstellen. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren."
}
],
"product_status": {
"known_affected": [
"67646",
"T027170",
"T004914",
"74185",
"T021995",
"T000126",
"T028505",
"T028506",
"T026754",
"T028105",
"T021299",
"T028103",
"T028102"
]
},
"release_date": "2023-07-11T22:00:00.000+00:00",
"title": "CVE-2023-36867"
},
{
"cve": "CVE-2023-35373",
"notes": [
{
"category": "description",
"text": "In Microsoft Visual Studio 2022, Microsoft Visual Studio Code und Microsoft .NET Framework existieren mehrere Schwachstellen. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren."
}
],
"product_status": {
"known_affected": [
"67646",
"T027170",
"T004914",
"74185",
"T021995",
"T000126",
"T028505",
"T028506",
"T026754",
"T028105",
"T021299",
"T028103",
"T028102"
]
},
"release_date": "2023-07-11T22:00:00.000+00:00",
"title": "CVE-2023-35373"
},
{
"cve": "CVE-2023-35333",
"notes": [
{
"category": "description",
"text": "In Microsoft Visual Studio 2022, Microsoft Visual Studio Code und Microsoft .NET Framework existieren mehrere Schwachstellen. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren."
}
],
"product_status": {
"known_affected": [
"67646",
"T027170",
"T004914",
"74185",
"T021995",
"T000126",
"T028505",
"T028506",
"T026754",
"T028105",
"T021299",
"T028103",
"T028102"
]
},
"release_date": "2023-07-11T22:00:00.000+00:00",
"title": "CVE-2023-35333"
},
{
"cve": "CVE-2023-33170",
"notes": [
{
"category": "description",
"text": "In Microsoft Visual Studio 2022, Microsoft Visual Studio Code und Microsoft .NET Framework existieren mehrere Schwachstellen. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren."
}
],
"product_status": {
"known_affected": [
"67646",
"T027170",
"T004914",
"74185",
"T021995",
"T000126",
"T028505",
"T028506",
"T026754",
"T028105",
"T021299",
"T028103",
"T028102"
]
},
"release_date": "2023-07-11T22:00:00.000+00:00",
"title": "CVE-2023-33170"
},
{
"cve": "CVE-2023-33127",
"notes": [
{
"category": "description",
"text": "In Microsoft Visual Studio 2022, Microsoft Visual Studio Code und Microsoft .NET Framework existieren mehrere Schwachstellen. Diese werden von Microsoft nicht im Detail beschrieben. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren."
}
],
"product_status": {
"known_affected": [
"67646",
"T027170",
"T004914",
"74185",
"T021995",
"T000126",
"T028505",
"T028506",
"T026754",
"T028105",
"T021299",
"T028103",
"T028102"
]
},
"release_date": "2023-07-11T22:00:00.000+00:00",
"title": "CVE-2023-33127"
}
]
}
GSD-2023-35333
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2023-35333",
"id": "GSD-2023-35333"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-35333"
],
"details": "MediaWiki PandocUpload Extension Remote Code Execution Vulnerability",
"id": "GSD-2023-35333",
"modified": "2023-12-13T01:20:46.621557Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2023-35333",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "PandocUpload",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "1.0.0",
"version_value": "1.0.1"
}
]
}
}
]
},
"vendor_name": "Microsoft"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "MediaWiki PandocUpload Extension Remote Code Execution Vulnerability"
}
]
},
"impact": {
"cvss": [
{
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35333",
"refsource": "MISC",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35333"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:microsoft:pandocupload:*:*:*:*:*:mediawiki:*:*",
"cpe_name": [],
"versionEndExcluding": "1.0.1",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2023-35333"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "MediaWiki PandocUpload Extension Remote Code Execution Vulnerability"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35333",
"refsource": "MISC",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35333"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-07-14T21:40Z",
"publishedDate": "2023-07-11T18:15Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.