Lucene search

K
cve[email protected]CVE-2019-1072
HistoryJul 15, 2019 - 7:15 p.m.

CVE-2019-1072

2019-07-1519:15:17
CWE-20
web.nvd.nist.gov
92
azure devops
tfs
remote code execution
vulnerability
cve-2019-1072
nvd

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

0.032 Low

EPSS

Percentile

91.3%

A remote code execution vulnerability exists when Azure DevOps Server and Team Foundation Server (TFS) improperly handle user input, aka ‘Azure DevOps Server and Team Foundation Server Remote Code Execution Vulnerability’.

Affected configurations

Vulners
NVD
Node
microsoftteam_foundation_server_2012MatchUpdate 4
OR
microsoftteam_foundation_server
OR
microsoftteam_foundation_server_2018MatchUpdate 1.2
OR
microsoftteam_foundation_server_2018MatchUpdate 3.2
OR
microsoftteam_foundation_server
OR
microsoftteam_foundation_server_2015MatchUpdate 4.2
OR
microsoftazure_devops_serverMatch2019.0.1
OR
microsoftteam_foundation_server_2010MatchSP1 (x86)
OR
microsoftteam_foundation_server_2010MatchSP1 (x64)
VendorProductVersionCPE
microsoftteam_foundation_server_2012Update 4cpe:2.3:a:microsoft:team_foundation_server_2012:Update 4:*:*:*:*:*:*:*
microsoftteam_foundation_server*cpe:2.3:a:microsoft:team_foundation_server:*:*:*:*:*:*:*:*
microsoftteam_foundation_server_2018Update 1.2cpe:2.3:a:microsoft:team_foundation_server_2018:Update 1.2:*:*:*:*:*:*:*
microsoftteam_foundation_server_2018Update 3.2cpe:2.3:a:microsoft:team_foundation_server_2018:Update 3.2:*:*:*:*:*:*:*
microsoftteam_foundation_server*cpe:2.3:a:microsoft:team_foundation_server:*:*:*:*:*:*:*:*
microsoftteam_foundation_server_2015Update 4.2cpe:2.3:a:microsoft:team_foundation_server_2015:Update 4.2:*:*:*:*:*:*:*
microsoftazure_devops_server2019.0.1cpe:2.3:a:microsoft:azure_devops_server:2019.0.1:*:*:*:*:*:*:*
microsoftteam_foundation_server_2010SP1 (x86)cpe:2.3:a:microsoft:team_foundation_server_2010:SP1 (x86):*:*:*:*:*:*:*
microsoftteam_foundation_server_2010SP1 (x64)cpe:2.3:a:microsoft:team_foundation_server_2010:SP1 (x64):*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Team Foundation Server 2012",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "Update 4"
      }
    ]
  },
  {
    "product": "Team Foundation Server 2013 Update 5",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "unspecified"
      }
    ]
  },
  {
    "product": "Team Foundation Server 2018",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "Update 1.2"
      },
      {
        "status": "affected",
        "version": "Update 3.2"
      }
    ]
  },
  {
    "product": "Team Foundation Server",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "2017 Update 3.1"
      }
    ]
  },
  {
    "product": "Team Foundation Server 2015",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "Update 4.2"
      }
    ]
  },
  {
    "product": "Azure DevOps Server",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "2019.0.1"
      }
    ]
  },
  {
    "product": "Team Foundation Server 2010",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "SP1 (x86)"
      },
      {
        "status": "affected",
        "version": "SP1 (x64)"
      }
    ]
  }
]

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

0.032 Low

EPSS

Percentile

91.3%