microsoft.entityframeworkcore.sqlserver.8.0.3.nupkg: 3 vulnerabilities (highest severity is: 5.5) - autoclosed
mend-for-github-com opened this issue · 1 comments
Vulnerable Library - microsoft.entityframeworkcore.sqlserver.8.0.3.nupkg
Path to dependency file: /DotNetWebhookCodeSnippets/DotnetWebhookCodeSnippets.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/azure.identity/1.10.3/azure.identity.1.10.3.nupkg
Found in HEAD commit: 3edaf92a0a3aa3d7441e08d996d889594d4650f6
Vulnerabilities
CVE | Severity | CVSS | Exploit Maturity | EPSS | Dependency | Type | Fixed in (microsoft.entityframeworkcore.sqlserver.8.0.3.nupkg version) | Remediation Possible** | Reachability |
---|---|---|---|---|---|---|---|---|---|
CVE-2024-35255 | Medium | 5.5 | Unproven | 0.0% | detected in multiple dependencies | Transitive | N/A* | ❌ | |
CVE-2024-29992 | Medium | 5.5 | Not Defined | 0.0% | azure.identity.1.10.3.nupkg | Transitive | N/A* | ❌ | |
CVE-2024-27086 | Low | 3.9 | Not Defined | 0.0% | microsoft.identity.client.4.56.0.nupkg | Transitive | N/A* | ❌ |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-35255
Vulnerable Libraries - microsoft.identity.client.4.56.0.nupkg, azure.identity.1.10.3.nupkg
microsoft.identity.client.4.56.0.nupkg
This package contains the binaries of the Microsoft Authentication Library for .NET (MSAL.NET).
Library home page: https://api.nuget.org/packages/microsoft.identity.client.4.56.0.nupkg
Path to dependency file: /DotNetWebhookCodeSnippets/DotnetWebhookCodeSnippets.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.identity.client/4.56.0/microsoft.identity.client.4.56.0.nupkg
Dependency Hierarchy:
- microsoft.entityframeworkcore.sqlserver.8.0.3.nupkg (Root Library)
- microsoft.data.sqlclient.5.1.5.nupkg
- ❌ microsoft.identity.client.4.56.0.nupkg (Vulnerable Library)
- microsoft.data.sqlclient.5.1.5.nupkg
azure.identity.1.10.3.nupkg
This is the implementation of the Azure SDK Client Library for Azure Identity
Library home page: https://api.nuget.org/packages/azure.identity.1.10.3.nupkg
Path to dependency file: /DotNetWebhookCodeSnippets/DotnetWebhookCodeSnippets.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/azure.identity/1.10.3/azure.identity.1.10.3.nupkg
Dependency Hierarchy:
- microsoft.entityframeworkcore.sqlserver.8.0.3.nupkg (Root Library)
- microsoft.data.sqlclient.5.1.5.nupkg
- ❌ azure.identity.1.10.3.nupkg (Vulnerable Library)
- microsoft.data.sqlclient.5.1.5.nupkg
Found in HEAD commit: 3edaf92a0a3aa3d7441e08d996d889594d4650f6
Found in base branch: master
Vulnerability Details
Azure Identity Libraries and Microsoft Authentication Library Elevation of Privilege Vulnerability
Publish Date: 2024-06-11
URL: CVE-2024-35255
Threat Assessment
Exploit Maturity: Unproven
EPSS: 0.0%
CVSS 3 Score Details (5.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: GHSA-m5vv-6r4h-3vj9
Release Date: 2024-06-11
Fix Resolution: @azure/identity - 4.2.1, @azure/msal-node - 2.9.1, Azure.Identity - 1.11.4, Microsoft.Identity.Client - 4.61.3, azure-identity - 1.16.1, com.azure:azure-identity:1.12.2, github.com/Azure/azure-sdk-for-go/sdk/azidentity - 1.6.0
CVE-2024-29992
Vulnerable Library - azure.identity.1.10.3.nupkg
This is the implementation of the Azure SDK Client Library for Azure Identity
Library home page: https://api.nuget.org/packages/azure.identity.1.10.3.nupkg
Path to dependency file: /DotNetWebhookCodeSnippets/DotnetWebhookCodeSnippets.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/azure.identity/1.10.3/azure.identity.1.10.3.nupkg
Dependency Hierarchy:
- microsoft.entityframeworkcore.sqlserver.8.0.3.nupkg (Root Library)
- microsoft.data.sqlclient.5.1.5.nupkg
- ❌ azure.identity.1.10.3.nupkg (Vulnerable Library)
- microsoft.data.sqlclient.5.1.5.nupkg
Found in HEAD commit: 3edaf92a0a3aa3d7441e08d996d889594d4650f6
Found in base branch: master
Vulnerability Details
Azure Identity Library for .NET Information Disclosure Vulnerability
Publish Date: 2024-04-09
URL: CVE-2024-29992
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.0%
CVSS 3 Score Details (5.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: GHSA-wvxc-855f-jvrv
Release Date: 2024-04-09
Fix Resolution: Azure.Identity - 1.11.0
CVE-2024-27086
Vulnerable Library - microsoft.identity.client.4.56.0.nupkg
This package contains the binaries of the Microsoft Authentication Library for .NET (MSAL.NET).
Library home page: https://api.nuget.org/packages/microsoft.identity.client.4.56.0.nupkg
Path to dependency file: /DotNetWebhookCodeSnippets/DotnetWebhookCodeSnippets.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.identity.client/4.56.0/microsoft.identity.client.4.56.0.nupkg
Dependency Hierarchy:
- microsoft.entityframeworkcore.sqlserver.8.0.3.nupkg (Root Library)
- microsoft.data.sqlclient.5.1.5.nupkg
- ❌ microsoft.identity.client.4.56.0.nupkg (Vulnerable Library)
- microsoft.data.sqlclient.5.1.5.nupkg
Found in HEAD commit: 3edaf92a0a3aa3d7441e08d996d889594d4650f6
Found in base branch: master
Vulnerability Details
The MSAL library enabled acquisition of security tokens to call protected APIs. MSAL.NET applications targeting Xamarin Android and .NET Android (e.g., MAUI) using the library from versions 4.48.0 to 4.60.0 are impacted by a low severity vulnerability.
A malicious application running on a customer Android device can cause local denial of service against applications that were built using MSAL.NET for authentication on the same device (i.e., prevent the user of the legitimate application from logging in) due to incorrect activity export configuration. MSAL.NET version 4.60.1 includes the fix. As a workaround, a developer may explicitly mark the MSAL.NET activity non-exported.
Publish Date: 2024-04-16
URL: CVE-2024-27086
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.0%
CVSS 3 Score Details (3.9)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: GHSA-x674-v45j-fwxw
Release Date: 2024-04-16
Fix Resolution: Microsoft.Identity.Client - 4.59.1,4.60.3
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.