Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
TitleVulnerability in ASP.NET SignalR Could Allow Elevation of Privilege
Informations
NameMS13-103First vendor Publication2013-12-10
VendorMicrosoftLast vendor Modification2013-12-10
Severity (Vendor) VersionRevision1.0

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score4.3Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Important
Revision Note: V1.0 (December 10, 2013): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in ASP.NET SignalR. The vulnerability could allow elevation of privilege if an attacker reflects specially crafted JavaScript back to the browser of a targeted user.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS13-103

CWE : Common Weakness Enumeration

%idName
100 %CWE-79Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:20798
 
Oval ID: oval:org.mitre.oval:def:20798
Title: SignalR XSS Vulnerability (CVE-2013-5042) - MS13-103
Description: Cross-site scripting (XSS) vulnerability in Microsoft ASP.NET SignalR 1.1.x before 1.1.4 and 2.0.x before 2.0.1, and Visual Studio Team Foundation Server 2013, allows remote attackers to inject arbitrary web script or HTML via crafted Forever Frame transport protocol data, aka "SignalR XSS Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2013-5042
Version: 5
Platform(s): Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Product(s): Microsoft Visual Studio Team Foundation Server
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application5
Application1

Information Assurance Vulnerability Management (IAVM)

DateDescription
2013-12-12IAVM : 2013-A-0224 - Microsoft ASP.NET SignalR Privilege Escalation Vulnerability
Severity : Category II - VMSKEY : V0042590

Nessus® Vulnerability Scanner

DateDescription
2013-12-11Name : The remote host has an application that is affected by a cross-site scripting...
File : smb_nt_ms13-103.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
DateInformations
2014-05-06 11:35:13
  • Multiple Updates
2014-05-06 11:33:52
  • Multiple Updates
2014-04-19 00:26:12
  • Multiple Updates
2014-04-19 00:18:59
  • Multiple Updates
2014-04-18 21:28:42
  • Multiple Updates
2014-04-18 21:20:07
  • Multiple Updates
2014-04-18 17:26:28
  • Multiple Updates
2014-04-18 17:19:23
  • Multiple Updates
2014-04-18 13:29:59
  • Multiple Updates
2014-04-18 13:19:59
  • Multiple Updates
2014-04-18 09:27:14
  • Multiple Updates
2014-04-18 09:19:33
  • Multiple Updates
2014-04-18 05:28:06
  • Multiple Updates
2014-04-18 05:20:41
  • Multiple Updates
2014-04-18 00:26:25
  • Multiple Updates
2014-04-18 00:18:46
  • Multiple Updates
2014-04-17 21:26:04
  • Multiple Updates
2014-04-17 21:19:55
  • Multiple Updates
2014-04-17 17:26:42
  • Multiple Updates
2014-04-17 17:19:06
  • Multiple Updates
2014-04-17 13:29:37
  • Multiple Updates
2014-04-17 13:20:14
  • Multiple Updates
2014-04-17 09:07:57
  • Multiple Updates
2014-02-17 11:47:53
  • Multiple Updates
2013-12-13 21:19:31
  • Multiple Updates
2013-12-11 21:24:26
  • Multiple Updates
2013-12-11 13:22:11
  • Multiple Updates
2013-12-10 21:16:15
  • First insertion