Executive Summary

This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Title Vulnerability in ASP.NET MVC Could Allow Security Feature Bypass (2990942)
Name MS14-059 First vendor Publication 2014-10-14
Vendor Microsoft Last vendor Modification 2014-10-14
Severity (Vendor) Important Revision 1.0

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Severity Rating: Important
Revision Note: V1.0 (October 14, 2014): Bulletin published.
Summary: This security update resolves a publicly disclosed vulnerability in ASP.NET MVC. The vulnerability could allow security feature bypass if an attacker convinces a user to click a specially crafted link or to visit a webpage that contains specially crafted content designed to exploit the vulnerability. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through a web browser, and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit these vulnerabilities. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website, or by getting them to open an attachment sent through email.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS14-059

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:26333
Oval ID: oval:org.mitre.oval:def:26333
Title: MVC XSS Vulnerability - CVE-2014-4075 (MS14-059)
Description: Cross-site scripting (XSS) vulnerability in System.Web.Mvc.dll in Microsoft ASP.NET Model View Controller (MVC) 2.0 through 5.1 allows remote attackers to inject arbitrary web script or HTML via a crafted web page, aka "MVC XSS Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2014-4075
Version: 3
Platform(s): Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2012
Microsoft Windows 8.1
Microsoft Windows Server 2012 R2
Product(s): Microsoft ASP .NET MVC 2.0
Microsoft ASP .NET MVC 3.0
Microsoft ASP .NET MVC 4.0
Definition Synopsis:

CPE : Common Platform Enumeration

Application 5

Information Assurance Vulnerability Management (IAVM)

Date Description
2014-10-16 IAVM : 2014-B-0138 - Microsoft ASP.NET MVC Security Bypass Vulnerability
Severity : Category II - VMSKEY : V0055467

Snort® IPS/IDS

Date Description
2014-01-10 script tag in URI - likely cross-site scripting attempt
RuleID : 7070 - Revision : 22 - Type : POLICY-OTHER

Nessus® Vulnerability Scanner

Date Description
2014-10-15 Name : The remote host has a web framework installed that is affected by a cross-sit...
File : smb_nt_ms14-059.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
Date Informations
2015-10-18 17:26:21
  • Multiple Updates
2014-10-16 17:26:11
  • Multiple Updates
2014-10-16 13:25:48
  • Multiple Updates
2014-10-15 17:26:02
  • Multiple Updates
2014-10-14 21:27:34
  • Multiple Updates
2014-10-14 21:16:34
  • First insertion