FontAwesome.Sharp
FontAwesome.Sharp copied to clipboard
CVE-2024-35255 (Medium) detected in microsoft.identity.client.4.56.0.nupkg, azure.identity.1.10.4.nupkg
CVE-2024-35255 - Medium Severity Vulnerability
Vulnerable Libraries - microsoft.identity.client.4.56.0.nupkg, azure.identity.1.10.4.nupkg
This package contains the binaries of the Microsoft Authentication Library for .NET (MSAL.NET).
Library home page: https://api.nuget.org/packages/microsoft.identity.client.4.56.0.nupkg Path to dependency file: /build/_build.csproj Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.identity.client/4.56.0/microsoft.identity.client.4.56.0.nupkg
Dependency Hierarchy: This is the implementation of the Azure SDK Client Library for Azure Identity Library home page: https://api.nuget.org/packages/azure.identity.1.10.4.nupkg Path to dependency file: /build/_build.csproj Path to vulnerable library: /home/wss-scanner/.nuget/packages/azure.identity/1.10.4/azure.identity.1.10.4.nupkg
Dependency Hierarchy:microsoft.identity.client.4.56.0.nupkg
azure.identity.1.10.4.nupkg
Found in HEAD commit: 348500ffe0124414d83645b108e48fd739c10153
Found in base branch: main
Vulnerability Details
Azure Identity Libraries and Microsoft Authentication Library Elevation of Privilege Vulnerability
Publish Date: 2024-06-11
URL: CVE-2024-35255
CVSS 3 Score Details (5.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://github.com/advisories/GHSA-m5vv-6r4h-3vj9
Release Date: 2024-06-11
Fix Resolution: @azure/identity - 4.2.1, @azure/msal-node - 2.9.1, Azure.Identity - 1.11.4, Microsoft.Identity.Client - 4.61.3, azure-identity - 1.16.1, com.azure:azure-identity:1.12.2, github.com/Azure/azure-sdk-for-go/sdk/azidentity - 1.6.0
Step up your Open Source Security Game with Mend here