Lucene search

K
nvd[email protected]NVD:CVE-2020-1476
HistoryAug 17, 2020 - 7:15 p.m.

CVE-2020-1476

2020-08-1719:15:15
web.nvd.nist.gov
7
elevation of privilege
asp.net
.net
iis
cached files
vulnerability
access restrictions
specially crafted request
security update

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.8

Confidence

High

EPSS

0

Percentile

9.5%

An elevation of privilege vulnerability exists when ASP.NET or .NET web applications running on IIS improperly allow access to cached files. An attacker who successfully exploited this vulnerability could gain access to restricted files.
To exploit this vulnerability, an attacker would need to send a specially crafted request to an affected server.
The update addresses the vulnerability by changing how ASP.NET and .NET handle requests.

Affected configurations

Nvd
Node
microsoft.net_frameworkMatch2.0sp2
AND
microsoftwindows_server_2008Match-sp2
Node
microsoft.net_frameworkMatch3.5
AND
microsoftwindows_8.1Match-
OR
microsoftwindows_server_2012Match-
OR
microsoftwindows_server_2012Matchr2
Node
microsoft.net_frameworkMatch3.5
OR
microsoft.net_frameworkMatch4.6.2
OR
microsoft.net_frameworkMatch4.7
OR
microsoft.net_frameworkMatch4.7.1
OR
microsoft.net_frameworkMatch4.7.2
AND
microsoftwindows_10Match1607
OR
microsoftwindows_server_2016Match-
Node
microsoft.net_frameworkMatch3.5
OR
microsoft.net_frameworkMatch4.6
OR
microsoft.net_frameworkMatch4.6.1
OR
microsoft.net_frameworkMatch4.6.2
AND
microsoftwindows_10Match-
Node
microsoft.net_frameworkMatch3.5
OR
microsoft.net_frameworkMatch4.7.1
OR
microsoft.net_frameworkMatch4.7.2
AND
microsoftwindows_10Match1709
Node
microsoft.net_frameworkMatch3.5
OR
microsoft.net_frameworkMatch4.7.2
AND
microsoftwindows_10Match1803
OR
microsoftwindows_10Match1809
OR
microsoftwindows_server_2019Match-
Node
microsoft.net_frameworkMatch3.5
OR
microsoft.net_frameworkMatch4.8
AND
microsoftwindows_10Match1809
OR
microsoftwindows_10Match1903
OR
microsoftwindows_10Match1909
OR
microsoftwindows_10Match2004
OR
microsoftwindows_server_2019Match-
Node
microsoft.net_frameworkMatch3.5.1
AND
microsoftwindows_7Matchsp1
OR
microsoftwindows_server_2008Matchr2
Node
microsoft.net_frameworkMatch4.5.2
AND
microsoftwindows_7Match-sp1
OR
microsoftwindows_8.1Match-
OR
microsoftwindows_rt_8.1Match-
OR
microsoftwindows_server_2008Match-sp2
OR
microsoftwindows_server_2008Matchr2sp1x64
OR
microsoftwindows_server_2012Match-
OR
microsoftwindows_server_2012Matchr2
Node
microsoft.net_frameworkMatch4.6
AND
microsoftwindows_server_2008Match-sp2
Node
microsoft.net_frameworkMatch4.6
OR
microsoft.net_frameworkMatch4.6.1
OR
microsoft.net_frameworkMatch4.6.2
OR
microsoft.net_frameworkMatch4.7
OR
microsoft.net_frameworkMatch4.7.1
OR
microsoft.net_frameworkMatch4.7.2
AND
microsoftwindows_7Match-sp1
OR
microsoftwindows_8.1Match-
OR
microsoftwindows_rt_8.1Match-
OR
microsoftwindows_server_2008Matchr2sp1x64
OR
microsoftwindows_server_2012Match-
OR
microsoftwindows_server_2012Matchr2
Node
microsoft.net_frameworkMatch4.8
AND
microsoftwindows_10Match1607
OR
microsoftwindows_10Match1709
OR
microsoftwindows_10Match1803
OR
microsoftwindows_7Match-sp1
OR
microsoftwindows_8.1Match-
OR
microsoftwindows_rt_8.1Match-
OR
microsoftwindows_server_2008Matchr2sp1x64
OR
microsoftwindows_server_2012Match-
OR
microsoftwindows_server_2012Matchr2
OR
microsoftwindows_server_2016Match-
VendorProductVersionCPE
microsoft.net_framework2.0cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*
microsoftwindows_server_2008-cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
microsoft.net_framework3.5cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*
microsoftwindows_8.1-cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
microsoftwindows_server_2012-cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
microsoftwindows_server_2012r2cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
microsoft.net_framework4.6.2cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*
microsoft.net_framework4.7cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*
microsoft.net_framework4.7.1cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*
microsoft.net_framework4.7.2cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*
Rows per page:
1-10 of 301

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.8

Confidence

High

EPSS

0

Percentile

9.5%