ID CVE-2019-0757
Summary A tampering vulnerability exists in the NuGet Package Manager for Linux and Mac that could allow an authenticated attacker to modify a NuGet package's folder structure, aka 'NuGet Package Manager Tampering Vulnerability'.
References
Vulnerable Configurations
  • cpe:2.3:a:microsoft:visual_studio_2017:-:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:visual_studio_2017:-:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
    cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:nuget:4.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:nuget:4.9.4:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:nuget:4.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:nuget:4.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:nuget:4.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:nuget:4.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:nuget:4.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:nuget:4.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:nuget:4.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:nuget:4.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:nuget:4.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:nuget:4.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:nuget:4.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:nuget:4.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:mono-project:mono_framework:5.18.0.223:*:*:*:*:*:*:*
    cpe:2.3:a:mono-project:mono_framework:5.18.0.223:*:*:*:*:*:*:*
  • cpe:2.3:a:mono-project:mono_framework:5.20.0:*:*:*:*:*:*:*
    cpe:2.3:a:mono-project:mono_framework:5.20.0:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:.net_core_sdk:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:.net_core_sdk:1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:.net_core:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:.net_core:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:.net_core:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:.net_core:1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:.net_core_sdk:2.1.500:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:.net_core_sdk:2.1.500:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:.net_core:2.1:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:.net_core:2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:.net_core_sdk:2.2.100:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:.net_core_sdk:2.2.100:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:.net_core:2.2:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:.net_core:2.2:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
CVSS
Base: 4.0 (as of 11-04-2022 - 20:36)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:S/C:N/I:P/A:N
redhat via4
advisories
rhsa
id RHSA-2019:1259
rpms
  • rh-dotnet21-0:2.1-8.el7
  • rh-dotnet21-dotnet-0:2.1.505-1.el7
  • rh-dotnet21-dotnet-debuginfo-0:2.1.505-1.el7
  • rh-dotnet21-dotnet-host-0:2.1.9-1.el7
  • rh-dotnet21-dotnet-runtime-2.1-0:2.1.9-1.el7
  • rh-dotnet21-dotnet-sdk-2.1-0:2.1.505-1.el7
  • rh-dotnet21-dotnet-sdk-2.1.5xx-0:2.1.505-1.el7
  • rh-dotnet21-runtime-0:2.1-8.el7
  • rh-dotnet22-0:2.2-4.el7
  • rh-dotnet22-dotnet-0:2.2.105-1.el7
  • rh-dotnet22-dotnet-debuginfo-0:2.2.105-1.el7
  • rh-dotnet22-dotnet-host-0:2.2.3-1.el7
  • rh-dotnet22-dotnet-host-fxr-2.2-0:2.2.3-1.el7
  • rh-dotnet22-dotnet-runtime-2.2-0:2.2.3-1.el7
  • rh-dotnet22-dotnet-sdk-2.2-0:2.2.105-1.el7
  • rh-dotnet22-dotnet-sdk-2.2.1xx-0:2.2.105-1.el7
  • rh-dotnet22-runtime-0:2.2-4.el7
  • rh-dotnetcore10-dotnetcore-0:1.0.15-1.el7
  • rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.15-1.el7
  • rh-dotnetcore11-dotnetcore-0:1.1.12-1.el7
  • rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.12-1.el7
  • dotnet-0:2.1.507-2.el8_0
  • dotnet-debuginfo-0:2.1.507-2.el8_0
  • dotnet-debugsource-0:2.1.507-2.el8_0
  • dotnet-host-0:2.1.11-2.el8_0
  • dotnet-host-debuginfo-0:2.1.11-2.el8_0
  • dotnet-host-fxr-2.1-0:2.1.11-2.el8_0
  • dotnet-host-fxr-2.1-debuginfo-0:2.1.11-2.el8_0
  • dotnet-runtime-2.1-0:2.1.11-2.el8_0
  • dotnet-runtime-2.1-debuginfo-0:2.1.11-2.el8_0
  • dotnet-sdk-2.1-0:2.1.507-2.el8_0
  • dotnet-sdk-2.1.5xx-0:2.1.507-2.el8_0
  • dotnet-sdk-2.1.5xx-debuginfo-0:2.1.507-2.el8_0
refmap via4
confirm https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0757
Last major update 11-04-2022 - 20:36
Published 09-04-2019 - 02:29
Last modified 11-04-2022 - 20:36
Back to Top