CVE-2023-36558: ASP.NET Core Security Feature Bypass Vulnerability

Overview

Severity
Medium (CVSS 6.2)
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
Category
Security Feature Bypass
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2023-Nov
Released
2023-11-14
Last Updated
2024-02-13
EPSS Score
0.35% (percentile: 57.4%)

FAQ

What kind of security feature could be bypassed by successfully exploiting this vulnerability? An unauthenticated attacker could bypass validations on Blazor Server forms. How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then trigger an event that could exploit the vulnerability to save an invalid state to a database or trigger other unintended actions, depending on what functionality the form provides.

Affected Products (10)

Developer Tools

  • .NET 6.0
  • ASP.NET Core 6.0
  • .NET 7.0
  • Microsoft Visual Studio 2022 version 17.2
  • .NET 8.0
  • Microsoft Visual Studio 2022 version 17.4
  • Microsoft Visual Studio 2022 version 17.6
  • Microsoft Visual Studio 2022 version 17.7
  • ASP.NET Core 7.0
  • ASP.NET Core 8.0

Security Updates (9)

Revision History

  • 2023-11-14: Information published.
  • 2023-11-28: Updated acknowledgment. This is an informational change only.
  • 2024-02-13: Corrected Article links in the Security Updates table. This is an informational change only.