-
Notifications
You must be signed in to change notification settings - Fork 52
CVE-2020-1108 (High) detected in microsoft.netcore.app.2.1.0.nupkg #435
Description
CVE-2020-1108 - High Severity Vulnerability
Vulnerable Library - microsoft.netcore.app.2.1.0.nupkg
A set of .NET API's that are included in the default .NET Core application model. caa7b7e2bad98e56a687fb5cbaf60825500800f7 When using NuGet 3.x this package requires at least version 3.4.
Library home page: https://api.nuget.org/packages/microsoft.netcore.app.2.1.0.nupkg
Path to dependency file: /desktop/src/Plexus.Interop.Transport.Protocol.Tests/Plexus.Interop.Transport.Protocol.Tests.csproj
Path to vulnerable library: /ackages/microsoft.netcore.app/2.1.0/microsoft.netcore.app.2.1.0.nupkg
Dependency Hierarchy:
- ❌ microsoft.netcore.app.2.1.0.nupkg (Vulnerable Library)
Found in HEAD commit: 8d1e24260d1985acc52e5d1710bcc43fcf3848ca
Found in base branch: master
Vulnerability Details
A denial of service vulnerability exists when .NET Core or .NET Framework improperly handles web requests, aka '.NET Core & .NET Framework Denial of Service Vulnerability'.
Publish Date: 2020-05-21
URL: CVE-2020-1108
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: GHSA-3w5p-jhp5-c29q
Release Date: 2020-05-21
Fix Resolution: Microsoft.NETCore.App - 2.1.18, Microsoft.NETCore.App.Runtime - 3.1.4
- Check this box to open an automated fix PR