CVE-2023-33136: Azure DevOps Server Remote Code Execution Vulnerability

Overview

Severity
High (CVSS 8.8)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
Category
Remote Code Execution
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2023-Sep
Released
2023-09-12
EPSS Score
0.66% (percentile: 71.2%)

FAQ

According to the CVSS metric, the attack vector is network (AV:N), attack complexity is low (AC:L), and privilege required is low (PR:L). What is the target used in the context of the remote code execution? Successful exploitation of this vulnerability requires an attacker to have Queue Build permissions on an Azure DevOps pipeline that has an overridable variable. An attacker with these permissions could perform remote code execution (RCE) by performing a malicious input injection via a runtime parameter that could be used in place of the overridable variable.

Affected Products (5)

Developer Tools

  • Azure DevOps Server 2020.0.2
  • Azure DevOps Server 2019.1.2
  • Azure DevOps Server 2020.1.2
  • Azure DevOps Server 2019.0.1

Azure

  • Azure DevOps Server 2022.0.1

Acknowledgments

Estevam Arantes, <a href="https://www.microsoft.com/">Microsoft</a>, Yogeesh Seralathan, <a href="https://www.microsoft.com/">Microsoft</a>, Michael Van Leeuwen, <a href="https://www.microsoft.com/">Microsoft</a>

Revision History

  • 2023-09-12: Information published.