CVE-2023-33170 (.Net vulnerability) indicated for .Net 6.0.20, but referenced data source indicates this version is fixed #4818
Closed
HughSayer
started this conversation in
False Detection
Replies: 1 comment 2 replies
-
Hello @HughSayer
Regards, Dmitry |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
IDs
CVE-2023-33170
Description
Hi,
I recieved this error for .Net 6.0.19, but on updating to the fixed version 6.0.20, the test indicates only "fixed" version is for .Net 7.0.9
output:
{
"Target": "db613f3a9265 (alpine 3.18.2)",
"Class": "os-pkgs",
"Type": "alpine"
},
{
"Target": "usr/share/dotnet/shared/Microsoft.AspNetCore.App/6.0.20/Microsoft.AspNetCore.App.deps.json",
"Class": "lang-pkgs",
"Type": "dotnet-core",
"Vulnerabilities": [
{
"VulnerabilityID": "CVE-2023-33170",
"PkgName": "Microsoft.AspNetCore.App.Runtime.linux-musl-x64",
"InstalledVersion": "6.0.20",
"FixedVersion": "7.0.9",
"Layer": {},
"SeveritySource": "ghsa",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-33170",
"DataSource": {
"ID": "ghsa",
"Name": "GitHub Security Advisory Nuget",
"URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anuget"
},
"Title": "race condition in Core SignInManager\u003cTUser\u003e PasswordSignInAsync method",
"Description": "ASP.NET and Visual Studio Security Feature Bypass Vulnerability",
"Severity": "HIGH",
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 8.1
},
"nvd": {
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 8.1
},
"redhat": {
"V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"V3Score": 8.1
}
},
"References": [
"https://access.redhat.com/security/cve/CVE-2023-33170",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33170",
"https://devblogs.microsoft.com/dotnet/july-2023-updates/",
"https://github.com/advisories/GHSA-25c8-p796-jg6r",
"https://github.com/dotnet/announcements/issues/264",
"https://github.com/dotnet/aspnetcore/issues/49334",
"https://github.com/dotnet/aspnetcore/security/advisories/GHSA-25c8-p796-jg6r",
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33170",
"https://nvd.nist.gov/vuln/detail/CVE-2023-33170",
"https://ubuntu.com/security/notices/USN-6217-1",
"https://www.cve.org/CVERecord?id=CVE-2023-33170"
],
"PublishedDate": "2023-07-11T18:15:00Z",
"LastModifiedDate": "2023-07-11T18:15:00Z"
}
]
}
Reproduction Steps
Target
Container Image
Scanner
Vulnerability
Target OS
Alpine 3.18
Debug Output
Version
Checklist
-f json
that shows data sources and confirmed that the security advisory in data sources was correctBeta Was this translation helpful? Give feedback.
All reactions