Vulnerabilities > CVE-2017-11879 - Open Redirect vulnerability in Microsoft Asp.Net Core 2.0

047910
CVSS 8.8 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
low complexity
microsoft
CWE-601
nessus

Summary

ASP.NET Core 2.0 allows an attacker to steal log-in session information such as cookies or authentication tokens via a specially crafted URL aka "ASP.NET Core Elevation Of Privilege Vulnerability".

Vulnerable Configurations

Part Description Count
Application
Microsoft
1

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Fake the Source of Data
    An adversary provides data under a falsified identity. The purpose of using the falsified identity may be to prevent traceability of the provided data or it might be an attempt by the adversary to assume the rights granted to another identity. One of the simplest forms of this attack would be the creation of an email message with a modified "From" field in order to appear that the message was sent from someone other than the actual sender. Results of the attack vary depending on the details of the attack, but common results include privilege escalation, obfuscation of other attacks, and data corruption/manipulation.

Nessus

NASL familyWindows
NASL idSMB_NT_MS17_ASPDOT_NET_12219.NASL
descriptionThe remote Windows host has an installation of ASP.NET Core runtime package store with a version less than 2.0.12219.0. Therefore the host is affected by multiple vulnerabilities : - An open redirect vulnerability that can lead to an escalation of privilege. (CVE-2017-11879) - A flaw that is triggered as web requests are not properly handled. This may allow a context-dependent attacker to cause a denial of service. (CVE-2017-11883)
last seen2020-06-01
modified2020-06-02
plugin id104665
published2017-11-17
reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/104665
titleSecurity Update ASP .NET Core September 2017
code
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from the Microsoft Security Updates API. The text
# itself is copyright (C) Microsoft Corporation.
#
include("compat.inc");

if (description)
{
  script_id(104665);
  script_version("1.8");
  script_cvs_date("Date: 2019/11/12");

  script_cve_id("CVE-2017-11879", "CVE-2017-11883");
  script_bugtraq_id(101713, 101835);

  script_name(english:"Security Update ASP .NET Core September 2017");
  script_summary(english:"Checks for Registry for ASP.Net Version");

  script_set_attribute(attribute:"synopsis", value:
"The remote Windows host is affected by an ASP.NET Core runtime
vulnerability.");
  script_set_attribute(attribute:"description", value:
"The remote Windows host has an installation of ASP.NET Core
runtime package store with a version less than 2.0.12219.0.
Therefore the host is affected by multiple vulnerabilities :

  -  An open redirect vulnerability
     that can lead to an escalation of privilege.
     (CVE-2017-11879)

  -  A flaw that is triggered as web requests are not properly
     handled. This may allow a context-dependent attacker to cause
     a denial of service.
     (CVE-2017-11883)");
  script_set_attribute(attribute:"see_also", value:"https://github.com/aspnet/announcements/issues/278");
  script_set_attribute(attribute:"see_also", value:"https://github.com/aspnet/announcements/issues/277");
  # https://download.microsoft.com/download/5/C/1/5C190037-632B-443D-842D-39085F02E1E8/AspNetCore.2.0.3.RuntimePackageStore_x64.exe
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?76216cca");
  # https://download.microsoft.com/download/5/C/1/5C190037-632B-443D-842D-39085F02E1E8/AspNetCore.2.0.3.RuntimePackageStore_x86.exe
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c82bcb0e");
  script_set_attribute(attribute:"solution", value:
"Download and update ASP .NET Core 2.0.3 runtime packages.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-11879");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2017/11/14");
  script_set_attribute(attribute:"patch_publication_date", value:"2017/11/14");
  script_set_attribute(attribute:"plugin_publication_date", value:"2017/11/17");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:.net_core");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("microsoft_asp_dotnet_core_win.nbin");
  script_require_keys("installed_sw/ASP .NET Core Windows");
  script_require_ports(139, 445);

  exit(0);
}

include("global_settings.inc");
include("audit.inc");
include("install_func.inc");
include("misc_func.inc");
include("smb_func.inc");

bulletin = "MS17-11";
appname = 'ASP .NET Core Windows';
port = kb_smb_transport();

get_install_count(app_name:appname, exit_if_zero:TRUE);
install  = get_single_install(app_name:appname, exit_if_unknown_ver:TRUE);
fix_ver = "2.0.12219.0";
version = install['version'];

if(ver_compare(ver: version, fix:fix_ver) < 0)
{
  report =
    '\n  Path              : ' + install['path'] +
    '\n  Installed version : ' + version +
    '\n  Fixed version     : ' + fix_ver +
    '\n';

  security_report_v4(port:port, severity:SECURITY_WARNING, extra:report);
  exit(0);
}

audit(AUDIT_INST_VER_NOT_VULN, appname, version);