You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
An information disclosure vulnerability exists in .NET Core when authentication information is inadvertently exposed in a redirect, aka ".NET Core Information Disclosure Vulnerability." This affects .NET Core 2.1, .NET Core 1.0, .NET Core 1.1, PowerShell Core 6.0.
A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names., aka 'Microsoft ASP.NET Core Security Feature Bypass Vulnerability'.
Vulnerable Library - microsoft.net.sdk.functions.1.0.24.nupkg
Build SDK for Azure Functions
Library home page: https://api.nuget.org/packages/microsoft.net.sdk.functions.1.0.24.nupkg
Path to dependency file: /SamplesV2/UntarAzureFilesWithAzureFunction/src/ExtractFunction/ExtractFunction.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.net.sdk.functions/1.0.24/microsoft.net.sdk.functions.1.0.24.nupkg
Found in HEAD commit: 216bf28400f470d9ba71ee4e2968bdad46892af7
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
Details
CVE-2021-26701
Vulnerable Library - system.text.encodings.web.4.5.0.nupkg
Provides types for encoding and escaping strings for use in JavaScript, HyperText Markup Language (H...
Library home page: https://api.nuget.org/packages/system.text.encodings.web.4.5.0.nupkg
Path to dependency file: /SamplesV2/UntarAzureFilesWithAzureFunction/src/ExtractFunction/ExtractFunction.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.text.encodings.web/4.5.0/system.text.encodings.web.4.5.0.nupkg
Dependency Hierarchy:
Found in HEAD commit: 216bf28400f470d9ba71ee4e2968bdad46892af7
Found in base branch: main
Vulnerability Details
.NET Core Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24112.
Publish Date: 2021-02-25
URL: CVE-2021-26701
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2021-02-25
Fix Resolution: System.Text.Encodings.Web - 4.5.1,4.7.2,5.0.1
CVE-2018-8292
Vulnerable Library - microsoft.net.sdk.functions.1.0.24.nupkg
Build SDK for Azure Functions
Library home page: https://api.nuget.org/packages/microsoft.net.sdk.functions.1.0.24.nupkg
Path to dependency file: /SamplesV2/UntarAzureFilesWithAzureFunction/src/ExtractFunction/ExtractFunction.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.net.sdk.functions/1.0.24/microsoft.net.sdk.functions.1.0.24.nupkg
Dependency Hierarchy:
Found in HEAD commit: 216bf28400f470d9ba71ee4e2968bdad46892af7
Found in base branch: main
Vulnerability Details
An information disclosure vulnerability exists in .NET Core when authentication information is inadvertently exposed in a redirect, aka ".NET Core Information Disclosure Vulnerability." This affects .NET Core 2.1, .NET Core 1.0, .NET Core 1.1, PowerShell Core 6.0.
Publish Date: 2018-10-10
URL: CVE-2018-8292
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2018-10-10
Fix Resolution: System.Net.Http - 4.3.4;Microsoft.PowerShell.Commands.Utility - 6.1.0-rc.1
⛑️ Automatic Remediation is available for this issue
CVE-2020-1045
Vulnerable Library - microsoft.aspnetcore.http.2.1.0.nupkg
ASP.NET Core default HTTP feature implementations.
Library home page: https://api.nuget.org/packages/microsoft.aspnetcore.http.2.1.0.nupkg
Path to dependency file: /SamplesV2/UntarAzureFilesWithAzureFunction/src/ExtractFunction/ExtractFunction.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.aspnetcore.http/2.1.0/microsoft.aspnetcore.http.2.1.0.nupkg
Dependency Hierarchy:
Found in HEAD commit: 216bf28400f470d9ba71ee4e2968bdad46892af7
Found in base branch: main
Vulnerability Details
A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names., aka 'Microsoft ASP.NET Core Security Feature Bypass Vulnerability'.
Publish Date: 2020-09-11
URL: CVE-2020-1045
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2020-09-11
Fix Resolution: Microsoft.AspNetCore.App - 2.1.22, Microsoft.AspNetCore.All - 2.1.22,Microsoft.NETCore.App - 2.1.22, Microsoft.AspNetCore.Http - 2.1.22
⛑️ Automatic Remediation is available for this issue.
The text was updated successfully, but these errors were encountered: