Miggo Logo

CVE-2023-35391:
.NET Information Disclosure Vulnerability

7.1

CVSS Score
3.1

Basic Information

EPSS Score
0.8387%
Published
8/11/2023
Updated
11/4/2023
KEV Status
No
Technology
TechnologyC#

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
Microsoft.AspNetCore.SignalR.StackExchangeRedisnuget>= 7.0.0, <= 7.0.97.0.10
Microsoft.AspNetCore.SignalR.StackExchangeRedisnuget>= 6.0.0, <= 6.0.206.0.21
Microsoft.AspNetCore.SignalR.Redisnuget< 1.0.401.0.40

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insecure message handling in Redis backplane implementations. Both packages (StackExchangeRedis and legacy Redis) contain core message transmission logic that failed to properly secure SignalR messages in Redis. The Publish/Send methods are the primary entry points for message distribution through Redis, and the advisory's focus on Redis backplane usage aligns with these functions. The CWE-200 classification confirms this is an information exposure issue in message handling.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

# Mi*roso*t S**urity **visory *V*-****-*****: .N*T In*orm*tion *is*losur* Vuln*r**ility ## <* n*m*="*x**utiv*-summ*ry"></*>*x**utiv* summ*ry Mi*roso*t is r*l**sin* t*is s**urity **visory to provi** in*orm*tion **out * vuln*r**ility in *SP.N*T *or*

Reasoning

T** vuln*r**ility st*ms *rom ins**ur* m*ss*** **n*lin* in R**is ***kpl*n* impl*m*nt*tions. *ot* p**k***s (St**k*x***n**R**is *n* l****y R**is) *ont*in *or* m*ss*** tr*nsmission lo*i* t**t **il** to prop*rly s**ur* Si*n*lR m*ss***s in R**is. T** Pu*li