FontAwesome.Sharp icon indicating copy to clipboard operation
FontAwesome.Sharp copied to clipboard

CVE-2024-38095 (High) detected in nuke.common.8.0.0.nupkg, system.formats.asn1.7.0.0.nupkg

Open mend-bolt-for-github[bot] opened this issue 6 months ago • 0 comments

CVE-2024-38095 - High Severity Vulnerability

Vulnerable Libraries - nuke.common.8.0.0.nupkg, system.formats.asn1.7.0.0.nupkg

nuke.common.8.0.0.nupkg

The AKEless Build System for C#/.NET Signed by signpath.io from repository 'https://github.com/nuke-build/nuke' commit '011956b31c05f14f3233f6241cd6fbe038824d71' (see contained AppVeyorSettings.json file for build settings).

Library home page: https://api.nuget.org/packages/nuke.common.8.0.0.nupkg

Path to dependency file: /build/_build.csproj

Path to vulnerable library: /home/wss-scanner/.nuget/packages/nuke.common/8.0.0/nuke.common.8.0.0.nupkg

Dependency Hierarchy:

  • :x: nuke.common.8.0.0.nupkg (Vulnerable Library)
system.formats.asn1.7.0.0.nupkg

Provides classes that can read and write the ASN.1 BER, CER, and DER data formats.

Commonly Used Types: System.Formats.Asn1.AsnReader System.Formats.Asn1.AsnWriter

Library home page: https://api.nuget.org/packages/system.formats.asn1.7.0.0.nupkg

Path to dependency file: /build/_build.csproj

Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.formats.asn1/7.0.0/system.formats.asn1.7.0.0.nupkg

Dependency Hierarchy:

  • nuke.common.8.0.0.nupkg (Root Library)
    • nuke.projectmodel.8.0.0.nupkg
      • microsoft.build.tasks.core.17.8.3.nupkg
        • system.security.cryptography.xml.7.0.1.nupkg
          • system.security.cryptography.pkcs.7.0.2.nupkg
            • :x: system.formats.asn1.7.0.0.nupkg (Vulnerable Library)

Found in HEAD commit: 348500ffe0124414d83645b108e48fd739c10153

Found in base branch: main

Vulnerability Details

.NET and Visual Studio Denial of Service Vulnerability

Publish Date: 2024-07-09

URL: CVE-2024-38095

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-447r-wph3-92pm

Release Date: 2024-07-09

Fix Resolution: Microsoft.NetCore.App.Runtime - 6.0.32,8.0.7, System.Formats.Asn1 - 6.0.1,8.0.1


Step up your Open Source Security Game with Mend here