Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2011-3417 | First vendor Publication | 2011-12-29 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The Forms Authentication feature in the ASP.NET subsystem in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5 SP1, 3.5.1, and 4.0, when sliding expiry is enabled, does not properly handle cached content, which allows remote attackers to obtain access to arbitrary user accounts via a crafted URL, aka "ASP.NET Forms Authentication Ticket Caching Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3417 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-264 | Permissions, Privileges, and Access Controls |
OVAL Definitions
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2011-12-30 | Name : Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (2638420) File : nvt/secpod_ms11-100.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
78056 | Microsoft .NET Framework Forms Authentication Sliding Expiry Cached Content P... |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2012-01-05 | IAVM : 2012-A-0001 - Multiple Vulnerabilities in Microsoft .NET Framework Severity : Category I - VMSKEY : V0030927 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows IIS .NET null character username truncation attempt RuleID : 25251 - Revision : 5 - Type : SERVER-IIS |
2014-01-10 | Microsoft Windows IIS .NET null character username truncation attempt RuleID : 25250 - Revision : 6 - Type : SERVER-IIS |
2014-01-10 | Microsoft Windows IIS .NET null character username truncation attempt RuleID : 20829 - Revision : 9 - Type : SERVER-IIS |
2014-01-10 | Microsoft Windows IIS aspx login ReturnURL arbitrary redirect attempt RuleID : 20828 - Revision : 10 - Type : SERVER-IIS |
2014-01-10 | generic web server hashing collision attack RuleID : 20825 - Revision : 11 - Type : SERVER-WEBAPP |
2014-01-10 | generic web server hashing collision attack RuleID : 20824 - Revision : 13 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2011-12-29 | Name : The version of ASP.NET Framework installed on the remote host is affected by ... File : smb_nt_ms11-100.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:03:13 |
|
2024-11-28 12:27:08 |
|
2024-08-02 12:17:38 |
|
2024-08-02 01:05:09 |
|
2024-02-02 01:17:08 |
|
2024-02-01 12:05:01 |
|
2023-12-07 21:28:01 |
|
2023-09-05 12:16:05 |
|
2023-09-05 01:04:54 |
|
2023-09-02 12:16:10 |
|
2023-09-02 01:04:59 |
|
2023-08-12 12:19:34 |
|
2023-08-12 01:05:00 |
|
2023-08-11 12:16:15 |
|
2023-08-11 01:05:09 |
|
2023-08-06 12:15:37 |
|
2023-08-06 01:05:00 |
|
2023-08-04 12:15:41 |
|
2023-08-04 01:05:00 |
|
2023-07-14 12:15:40 |
|
2023-07-14 01:04:58 |
|
2023-03-29 01:17:34 |
|
2023-03-28 12:05:05 |
|
2022-10-11 12:13:59 |
|
2022-10-11 01:04:43 |
|
2021-05-04 12:17:32 |
|
2021-04-22 01:20:52 |
|
2020-09-28 17:22:43 |
|
2020-05-23 00:31:06 |
|
2019-05-09 12:04:12 |
|
2019-02-26 17:19:36 |
|
2018-10-31 00:20:16 |
|
2018-10-13 05:18:33 |
|
2018-09-20 12:09:17 |
|
2017-09-19 09:24:55 |
|
2016-09-30 01:03:19 |
|
2016-08-31 12:03:04 |
|
2016-08-05 12:03:24 |
|
2016-06-28 18:49:22 |
|
2016-04-26 21:04:01 |
|
2014-02-17 11:05:10 |
|
2013-11-11 12:39:35 |
|
2013-05-10 23:07:21 |
|
2013-01-30 13:21:07 |
|