CVE-2023-21553: Azure DevOps Server Remote Code Execution Vulnerability

Overview

Severity
High (CVSS 7.5)
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Remote Code Execution
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2023-Feb
Released
2023-02-14
EPSS Score
1.99% (percentile: 83.6%)

FAQ

According to the CVSS metric, the attack complexity is high (AC:H). What does this mean for this vulnerability? Owning an affected domain is not enough to run the attack. For a successful attacker the appropriate variable must be used in the pipeline, and not every pipeline is vulnerable. According to the CVSS metric, the attack vector is network (AV:N), user interaction is none (UI:N), and privilege required is low (PR:L). What is the target used in the context of the remote code execution? The attacker for this vulnerability could target the server accounts in an arbitrary or remote code execution. As an authenticated user, the attacker could attempt to trigger malicious code in the context of the server's account through a network call. The privilege requirement is low because the attack needs to have only Run access to the pipeline. Azure DevOps server is not bound to any network stack or protocol. Communication is on the TCP/IP level and this allows to communicate over the Internet.

Affected Products (1)

Developer Tools

  • Azure DevOps Server 2020.1.2

Security Updates (1)

Acknowledgments

<a href="https://www.linkedin.com/company/legitsecurity/">Legit Security (LinkedIn)</a> with <a href="https://www.legitsecurity.com/">Legit Security</a>

Revision History

  • 2023-02-14: Information published.