Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-0247 (GCVE-0-2017-0247)
Vulnerability from cvelistv5 – Published: 2017-05-12 14:00 – Updated: 2024-08-05 12:55
VLAI?
EPSS
Summary
A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.
Severity ?
No CVSS data available.
CWE
- Denial of Service
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Microsoft Corporation | ASP.NET Core |
Affected:
ASP.NET Core
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T12:55:19.171Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://technet.microsoft.com/en-us/library/security/4021279.aspx"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/aspnet/Announcements/issues/239"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "ASP.NET Core",
"vendor": "Microsoft Corporation",
"versions": [
{
"status": "affected",
"version": "ASP.NET Core"
}
]
}
],
"datePublic": "2017-05-09T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Denial of Service",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-05-25T18:57:01.000Z",
"orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"shortName": "microsoft"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://technet.microsoft.com/en-us/library/security/4021279.aspx"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/aspnet/Announcements/issues/239"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2017-0247",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "ASP.NET Core",
"version": {
"version_data": [
{
"version_value": "ASP.NET Core"
}
]
}
}
]
},
"vendor_name": "Microsoft Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://technet.microsoft.com/en-us/library/security/4021279.aspx",
"refsource": "CONFIRM",
"url": "https://technet.microsoft.com/en-us/library/security/4021279.aspx"
},
{
"name": "https://github.com/aspnet/Announcements/issues/239",
"refsource": "MISC",
"url": "https://github.com/aspnet/Announcements/issues/239"
},
{
"name": "https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS",
"refsource": "MISC",
"url": "https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"assignerShortName": "microsoft",
"cveId": "CVE-2017-0247",
"datePublished": "2017-05-12T14:00:00.000Z",
"dateReserved": "2016-09-09T00:00:00.000Z",
"dateUpdated": "2024-08-05T12:55:19.171Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CNVD-2017-07322
Vulnerability from cnvd - Published: 2017-05-24
VLAI Severity ?
Title
Microsoft ASP.NET Core拒绝服务漏洞
Description
Microsoft ASP.NET Core是美国微软(Microsoft)公司的一个跨平台开源框架。该框架用于构建Web一应用、物联网应用和移动后端等基于云的应用程序。
Microsoft ASP.NET Core中存在拒绝服务漏洞,该漏洞源于程序未能正确的验证Web请求。攻击者可利用该漏洞造成拒绝服务。
Severity
中
Patch Name
Microsoft ASP.NET Core拒绝服务漏洞的补丁
Patch Description
Microsoft ASP.NET Core是美国微软(Microsoft)公司的一个跨平台开源框架。该框架用于构建Web一应用、物联网应用和移动后端等基于云的应用程序。
Microsoft ASP.NET Core中存在拒绝服务漏洞,该漏洞源于程序未能正确的验证Web请求。攻击者可利用该漏洞造成拒绝服务。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接: https://github.com/aspnet/Announcements/issues/239
Reference
https://github.com/aspnet/Announcements/issues/239
Impacted products
| Name | Microsoft ASP.NET Core |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2017-0247"
}
},
"description": "Microsoft ASP.NET Core\u662f\u7f8e\u56fd\u5fae\u8f6f\uff08Microsoft\uff09\u516c\u53f8\u7684\u4e00\u4e2a\u8de8\u5e73\u53f0\u5f00\u6e90\u6846\u67b6\u3002\u8be5\u6846\u67b6\u7528\u4e8e\u6784\u5efaWeb\u4e00\u5e94\u7528\u3001\u7269\u8054\u7f51\u5e94\u7528\u548c\u79fb\u52a8\u540e\u7aef\u7b49\u57fa\u4e8e\u4e91\u7684\u5e94\u7528\u7a0b\u5e8f\u3002\r\n\r\nMicrosoft ASP.NET Core\u4e2d\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u6b63\u786e\u7684\u9a8c\u8bc1Web\u8bf7\u6c42\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002",
"discovererName": "David Fernandez",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://github.com/aspnet/Announcements/issues/239",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-07322",
"openTime": "2017-05-24",
"patchDescription": "Microsoft ASP.NET Core\u662f\u7f8e\u56fd\u5fae\u8f6f\uff08Microsoft\uff09\u516c\u53f8\u7684\u4e00\u4e2a\u8de8\u5e73\u53f0\u5f00\u6e90\u6846\u67b6\u3002\u8be5\u6846\u67b6\u7528\u4e8e\u6784\u5efaWeb\u4e00\u5e94\u7528\u3001\u7269\u8054\u7f51\u5e94\u7528\u548c\u79fb\u52a8\u540e\u7aef\u7b49\u57fa\u4e8e\u4e91\u7684\u5e94\u7528\u7a0b\u5e8f\u3002\r\n\r\nMicrosoft ASP.NET Core\u4e2d\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u6b63\u786e\u7684\u9a8c\u8bc1Web\u8bf7\u6c42\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Microsoft ASP.NET Core\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Microsoft ASP.NET Core"
},
"referenceLink": "https://github.com/aspnet/Announcements/issues/239",
"serverity": "\u4e2d",
"submitTime": "2017-05-19",
"title": "Microsoft ASP.NET Core\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e"
}
GSD-2017-0247
Vulnerability from gsd - Updated: 2023-12-13 01:20Details
A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2017-0247",
"description": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.",
"id": "GSD-2017-0247"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-0247"
],
"details": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.",
"id": "GSD-2017-0247",
"modified": "2023-12-13T01:20:59.568637Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2017-0247",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "ASP.NET Core",
"version": {
"version_data": [
{
"version_value": "ASP.NET Core"
}
]
}
}
]
},
"vendor_name": "Microsoft Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://technet.microsoft.com/en-us/library/security/4021279.aspx",
"refsource": "CONFIRM",
"url": "https://technet.microsoft.com/en-us/library/security/4021279.aspx"
},
{
"name": "https://github.com/aspnet/Announcements/issues/239",
"refsource": "MISC",
"url": "https://github.com/aspnet/Announcements/issues/239"
},
{
"name": "https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS",
"refsource": "MISC",
"url": "https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "[1.0.0,1.0.4),[1.1.0,1.1.3)",
"affected_versions": "All versions starting from 1.0.0 before 1.0.4, all versions starting from 1.1.0 before 1.1.3",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-937"
],
"date": "2021-06-30",
"description": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.",
"fixed_versions": [
"1.1.3"
],
"identifier": "CVE-2017-0247",
"identifiers": [
"CVE-2017-0247"
],
"not_impacted": "All versions before 1.0.0, all versions starting from 1.0.4 before 1.1.0, all versions starting from 1.1.3",
"package_slug": "nuget/Microsoft.AspNet.Mvc",
"pubdate": "2017-05-12",
"solution": "Upgrade to version 1.1.3 or above.",
"title": "Improper Input Validation",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2017-0247",
"https://github.com/aspnet/Announcements/issues/239",
"https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS",
"https://technet.microsoft.com/en-us/library/security/4021279.aspx"
],
"uuid": "0a9d8e71-2126-4215-ba8f-8602a16ef9c5"
},
{
"affected_range": "[1.0.0,1.0.4),[1.1.0,1.1.3)",
"affected_versions": "All versions starting from 1.0.0 before 1.0.4, all versions starting from 1.1.0 before 1.1.3",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-707",
"CWE-937"
],
"date": "2021-07-01",
"description": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.",
"fixed_versions": [
"1.0.4",
"1.1.3"
],
"identifier": "CVE-2017-0247",
"identifiers": [
"GHSA-6xh7-4v2w-36q6",
"CVE-2017-0247"
],
"not_impacted": "All versions before 1.0.0, all versions starting from 1.0.4 before 1.1.0, all versions starting from 1.1.3",
"package_slug": "nuget/Microsoft.AspNetCore.Mvc.Abstractions",
"pubdate": "2018-10-16",
"solution": "Upgrade to versions 1.0.4, 1.1.3 or above.",
"title": "Improper Input Validation",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2017-0247",
"https://github.com/aspnet/Announcements/issues/239",
"https://github.com/advisories/GHSA-6xh7-4v2w-36q6"
],
"uuid": "a9cacd89-11e7-4bd8-a1da-acd854a081d7"
},
{
"affected_range": "[1.0.0,1.0.4),[1.1.0,1.1.3)",
"affected_versions": "All versions starting from 1.0.0 before 1.0.4, all versions starting from 1.1.0 before 1.1.3",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-707",
"CWE-937"
],
"date": "2021-07-01",
"description": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.",
"fixed_versions": [
"1.0.4",
"1.1.3"
],
"identifier": "CVE-2017-0247",
"identifiers": [
"GHSA-6xh7-4v2w-36q6",
"CVE-2017-0247"
],
"not_impacted": "All versions before 1.0.0, all versions starting from 1.0.4 before 1.1.0, all versions starting from 1.1.3",
"package_slug": "nuget/Microsoft.AspNetCore.Mvc.ApiExplorer",
"pubdate": "2018-10-16",
"solution": "Upgrade to versions 1.0.4, 1.1.3 or above.",
"title": "Improper Input Validation",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2017-0247",
"https://github.com/aspnet/Announcements/issues/239",
"https://github.com/advisories/GHSA-6xh7-4v2w-36q6"
],
"uuid": "7219a449-4c33-4da3-b29f-d9d0b3371cf1"
},
{
"affected_range": "[1.0.0,1.0.4),[1.1.0,1.1.3)",
"affected_versions": "All versions starting from 1.0.0 before 1.0.4, all versions starting from 1.1.0 before 1.1.3",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-707",
"CWE-937"
],
"date": "2021-07-01",
"description": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.",
"fixed_versions": [
"1.0.4",
"1.1.3"
],
"identifier": "CVE-2017-0247",
"identifiers": [
"GHSA-6xh7-4v2w-36q6",
"CVE-2017-0247"
],
"not_impacted": "All versions before 1.0.0, all versions starting from 1.0.4 before 1.1.0, all versions starting from 1.1.3",
"package_slug": "nuget/Microsoft.AspNetCore.Mvc.Core",
"pubdate": "2018-10-16",
"solution": "Upgrade to versions 1.0.4, 1.1.3 or above.",
"title": "Improper Input Validation",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2017-0247",
"https://github.com/aspnet/Announcements/issues/239",
"https://github.com/advisories/GHSA-6xh7-4v2w-36q6"
],
"uuid": "ae709123-1640-49dd-b2fc-87d29391b24e"
},
{
"affected_range": "[1.0.0,1.0.4),[1.1.0,1.1.3)",
"affected_versions": "All versions starting from 1.0.0 before 1.0.4, all versions starting from 1.1.0 before 1.1.3",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-707",
"CWE-937"
],
"date": "2021-07-01",
"description": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.",
"fixed_versions": [
"1.0.4",
"1.1.3"
],
"identifier": "CVE-2017-0247",
"identifiers": [
"GHSA-6xh7-4v2w-36q6",
"CVE-2017-0247"
],
"not_impacted": "All versions before 1.0.0, all versions starting from 1.0.4 before 1.1.0, all versions starting from 1.1.3",
"package_slug": "nuget/Microsoft.AspNetCore.Mvc.Cors",
"pubdate": "2018-10-16",
"solution": "Upgrade to versions 1.0.4, 1.1.3 or above.",
"title": "Improper Input Validation",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2017-0247",
"https://github.com/aspnet/Announcements/issues/239",
"https://github.com/advisories/GHSA-6xh7-4v2w-36q6"
],
"uuid": "89a281a4-5f43-4b29-82f9-99addfc888ec"
},
{
"affected_range": "[1.0.0,1.0.4),[1.1.0,1.1.3)",
"affected_versions": "All versions starting from 1.0.0 before 1.0.4, all versions starting from 1.1.0 before 1.1.3",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-707",
"CWE-937"
],
"date": "2021-07-01",
"description": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.",
"fixed_versions": [
"1.0.4",
"1.1.3"
],
"identifier": "CVE-2017-0247",
"identifiers": [
"GHSA-6xh7-4v2w-36q6",
"CVE-2017-0247"
],
"not_impacted": "All versions before 1.0.0, all versions starting from 1.0.4 before 1.1.0, all versions starting from 1.1.3",
"package_slug": "nuget/Microsoft.AspNetCore.Mvc.DataAnnotations",
"pubdate": "2018-10-16",
"solution": "Upgrade to versions 1.0.4, 1.1.3 or above.",
"title": "Improper Input Validation",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2017-0247",
"https://github.com/aspnet/Announcements/issues/239",
"https://github.com/advisories/GHSA-6xh7-4v2w-36q6"
],
"uuid": "6e8e2c26-189e-4870-80f8-4aa1aaba8a0f"
},
{
"affected_range": "[1.0.0,1.0.4),[1.1.0,1.1.3)",
"affected_versions": "All versions starting from 1.0.0 before 1.0.4, all versions starting from 1.1.0 before 1.1.3",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-707",
"CWE-937"
],
"date": "2021-07-01",
"description": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.",
"fixed_versions": [
"1.0.4",
"1.1.3"
],
"identifier": "CVE-2017-0247",
"identifiers": [
"GHSA-6xh7-4v2w-36q6",
"CVE-2017-0247"
],
"not_impacted": "All versions before 1.0.0, all versions starting from 1.0.4 before 1.1.0, all versions starting from 1.1.3",
"package_slug": "nuget/Microsoft.AspNetCore.Mvc.Formatters.Json",
"pubdate": "2018-10-16",
"solution": "Upgrade to versions 1.0.4, 1.1.3 or above.",
"title": "Improper Input Validation",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2017-0247",
"https://github.com/aspnet/Announcements/issues/239",
"https://github.com/advisories/GHSA-6xh7-4v2w-36q6"
],
"uuid": "8041837c-e26e-422f-b091-c986195a0ee2"
},
{
"affected_range": "[1.0.0,1.0.4),[1.1.0,1.1.3)",
"affected_versions": "All versions starting from 1.0.0 before 1.0.4, all versions starting from 1.1.0 before 1.1.3",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-707",
"CWE-937"
],
"date": "2021-07-01",
"description": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.",
"fixed_versions": [
"1.0.4",
"1.1.3"
],
"identifier": "CVE-2017-0247",
"identifiers": [
"GHSA-6xh7-4v2w-36q6",
"CVE-2017-0247"
],
"not_impacted": "All versions before 1.0.0, all versions starting from 1.0.4 before 1.1.0, all versions starting from 1.1.3",
"package_slug": "nuget/Microsoft.AspNetCore.Mvc.Formatters.Xml",
"pubdate": "2018-10-16",
"solution": "Upgrade to versions 1.0.4, 1.1.3 or above.",
"title": "Improper Input Validation",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2017-0247",
"https://github.com/aspnet/Announcements/issues/239",
"https://github.com/advisories/GHSA-6xh7-4v2w-36q6"
],
"uuid": "b39f082d-8f52-444f-b066-70b3c6cca648"
},
{
"affected_range": "[1.0.0,1.0.4),[1.1.0,1.1.3)",
"affected_versions": "All versions starting from 1.0.0 before 1.0.4, all versions starting from 1.1.0 before 1.1.3",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-707",
"CWE-937"
],
"date": "2021-07-01",
"description": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.",
"fixed_versions": [
"1.0.4",
"1.1.3"
],
"identifier": "CVE-2017-0247",
"identifiers": [
"GHSA-6xh7-4v2w-36q6",
"CVE-2017-0247"
],
"not_impacted": "All versions before 1.0.0, all versions starting from 1.0.4 before 1.1.0, all versions starting from 1.1.3",
"package_slug": "nuget/Microsoft.AspNetCore.Mvc.Localization",
"pubdate": "2018-10-16",
"solution": "Upgrade to versions 1.0.4, 1.1.3 or above.",
"title": "Improper Input Validation",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2017-0247",
"https://github.com/aspnet/Announcements/issues/239",
"https://github.com/advisories/GHSA-6xh7-4v2w-36q6"
],
"uuid": "60d3c030-2906-4aab-8643-387077a35a7c"
},
{
"affected_range": "[1.0.0,1.0.4),[1.1.0,1.1.3)",
"affected_versions": "All versions starting from 1.0.0 before 1.0.4, all versions starting from 1.1.0 before 1.1.3",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-707",
"CWE-937"
],
"date": "2021-07-01",
"description": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.",
"fixed_versions": [
"1.0.4",
"1.1.3"
],
"identifier": "CVE-2017-0247",
"identifiers": [
"GHSA-6xh7-4v2w-36q6",
"CVE-2017-0247"
],
"not_impacted": "All versions before 1.0.0, all versions starting from 1.0.4 before 1.1.0, all versions starting from 1.1.3",
"package_slug": "nuget/Microsoft.AspNetCore.Mvc.Razor.Host",
"pubdate": "2018-10-16",
"solution": "Upgrade to versions 1.0.4, 1.1.3 or above.",
"title": "Improper Input Validation",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2017-0247",
"https://github.com/aspnet/Announcements/issues/239",
"https://github.com/advisories/GHSA-6xh7-4v2w-36q6"
],
"uuid": "f2bc2f5d-d036-4feb-8d20-d52e9a4d752b"
},
{
"affected_range": "[1.0.0,1.0.4),[1.1.0,1.1.3)",
"affected_versions": "All versions starting from 1.0.0 before 1.0.4, all versions starting from 1.1.0 before 1.1.3",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-707",
"CWE-937"
],
"date": "2021-07-01",
"description": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.",
"fixed_versions": [
"1.0.4",
"1.1.3"
],
"identifier": "CVE-2017-0247",
"identifiers": [
"GHSA-6xh7-4v2w-36q6",
"CVE-2017-0247"
],
"not_impacted": "All versions before 1.0.0, all versions starting from 1.0.4 before 1.1.0, all versions starting from 1.1.3",
"package_slug": "nuget/Microsoft.AspNetCore.Mvc.Razor",
"pubdate": "2018-10-16",
"solution": "Upgrade to versions 1.0.4, 1.1.3 or above.",
"title": "Improper Input Validation",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2017-0247",
"https://github.com/aspnet/Announcements/issues/239",
"https://github.com/advisories/GHSA-6xh7-4v2w-36q6"
],
"uuid": "1f90c850-3563-4ba9-917e-c8cd08b885ab"
},
{
"affected_range": "[1.0.0,1.0.4),[1.1.0,1.1.3)",
"affected_versions": "All versions starting from 1.0.0 before 1.0.4, all versions starting from 1.1.0 before 1.1.3",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-707",
"CWE-937"
],
"date": "2021-07-01",
"description": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.",
"fixed_versions": [
"1.0.4",
"1.1.3"
],
"identifier": "CVE-2017-0247",
"identifiers": [
"GHSA-6xh7-4v2w-36q6",
"CVE-2017-0247"
],
"not_impacted": "All versions before 1.0.0, all versions starting from 1.0.4 before 1.1.0, all versions starting from 1.1.3",
"package_slug": "nuget/Microsoft.AspNetCore.Mvc.TagHelpers",
"pubdate": "2018-10-16",
"solution": "Upgrade to versions 1.0.4, 1.1.3 or above.",
"title": "Improper Input Validation",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2017-0247",
"https://github.com/aspnet/Announcements/issues/239",
"https://github.com/advisories/GHSA-6xh7-4v2w-36q6"
],
"uuid": "339d0141-db5e-4352-ae24-d18eeea0f192"
},
{
"affected_range": "[1.0.0,1.0.4),[1.1.0,1.1.3)",
"affected_versions": "All versions starting from 1.0.0 before 1.0.4, all versions starting from 1.1.0 before 1.1.3",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-707",
"CWE-937"
],
"date": "2021-07-01",
"description": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.",
"fixed_versions": [
"1.0.4",
"1.1.3"
],
"identifier": "CVE-2017-0247",
"identifiers": [
"GHSA-6xh7-4v2w-36q6",
"CVE-2017-0247"
],
"not_impacted": "All versions before 1.0.0, all versions starting from 1.0.4 before 1.1.0, all versions starting from 1.1.3",
"package_slug": "nuget/Microsoft.AspNetCore.Mvc.ViewFeatures",
"pubdate": "2018-10-16",
"solution": "Upgrade to versions 1.0.4, 1.1.3 or above.",
"title": "Improper Input Validation",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2017-0247",
"https://github.com/aspnet/Announcements/issues/239",
"https://github.com/advisories/GHSA-6xh7-4v2w-36q6"
],
"uuid": "fd923027-9248-43ec-a6b0-724702d1880b"
},
{
"affected_range": "[1.0.0,1.0.4),[1.1.0,1.1.3)",
"affected_versions": "All versions starting from 1.0.0 before 1.0.4, all versions starting from 1.1.0 before 1.1.3",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-707",
"CWE-937"
],
"date": "2021-07-01",
"description": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.",
"fixed_versions": [
"1.0.4",
"1.1.3"
],
"identifier": "CVE-2017-0247",
"identifiers": [
"GHSA-6xh7-4v2w-36q6",
"CVE-2017-0247"
],
"not_impacted": "All versions before 1.0.0, all versions starting from 1.0.4 before 1.1.0, all versions starting from 1.1.3",
"package_slug": "nuget/Microsoft.AspNetCore.Mvc.WebApiCompatShim",
"pubdate": "2018-10-16",
"solution": "Upgrade to versions 1.0.4, 1.1.3 or above.",
"title": "Improper Input Validation",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2017-0247",
"https://github.com/aspnet/Announcements/issues/239",
"https://github.com/advisories/GHSA-6xh7-4v2w-36q6"
],
"uuid": "adbecef7-e5b5-479d-9596-f1dc79ed14d1"
},
{
"affected_range": "[1.1.0,1.1.3),[1.0.0,1.0.4)",
"affected_versions": "All versions starting from 1.1.0 before 1.1.3, all versions starting from 1.0.0 before 1.0.4",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-707",
"CWE-937"
],
"date": "2021-07-01",
"description": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.",
"fixed_versions": [
"1.1.3",
"1.1.3"
],
"identifier": "CVE-2017-0247",
"identifiers": [
"GHSA-6xh7-4v2w-36q6",
"CVE-2017-0247"
],
"not_impacted": "All versions before 1.1.0, all versions starting from 1.1.3, all versions before 1.0.0, all versions starting from 1.0.4",
"package_slug": "nuget/Microsoft.AspNetCore.Mvc",
"pubdate": "2018-10-16",
"solution": "Upgrade to versions 1.1.3, 1.1.3 or above.",
"title": "Improper Input Validation",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2017-0247",
"https://github.com/aspnet/Announcements/issues/239",
"https://github.com/advisories/GHSA-6xh7-4v2w-36q6"
],
"uuid": "f5c85d9f-8d71-4568-a8bb-2d669bac7e4f"
},
{
"affected_range": "[4.0.0],[4.3.0,4.5.4)",
"affected_versions": "Version 4.0.0, all versions starting from 4.3.0 before 4.5.4",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-707",
"CWE-937"
],
"date": "2021-07-01",
"description": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.",
"fixed_versions": [
"4.0.1",
"4.5.4"
],
"identifier": "CVE-2017-0247",
"identifiers": [
"GHSA-6xh7-4v2w-36q6",
"CVE-2017-0247"
],
"not_impacted": "All versions before 4.0.0, all versions after 4.0.0 before 4.3.0, all versions starting from 4.5.4",
"package_slug": "nuget/System.Net.Http.WinHttpHandler",
"pubdate": "2018-10-16",
"solution": "Upgrade to versions 4.0.1, 4.5.4 or above.",
"title": "Improper Input Validation",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2017-0247",
"https://github.com/aspnet/Announcements/issues/239",
"https://github.com/advisories/GHSA-6xh7-4v2w-36q6"
],
"uuid": "b51a95c1-07b3-4ef4-9ea3-aaa1418ca148"
},
{
"affected_range": "[4.1.1],[4.3.1]",
"affected_versions": "Version 4.1.1, version 4.3.1",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-707",
"CWE-937"
],
"date": "2021-07-01",
"description": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.",
"fixed_versions": [
"4.1.2",
"4.3.2"
],
"identifier": "CVE-2017-0247",
"identifiers": [
"GHSA-6xh7-4v2w-36q6",
"CVE-2017-0247"
],
"not_impacted": "All versions before 4.1.1, all versions after 4.1.1 before 4.3.1, all versions after 4.3.1",
"package_slug": "nuget/System.Net.Http",
"pubdate": "2018-10-16",
"solution": "Upgrade to versions 4.1.2, 4.3.2 or above.",
"title": "Improper Input Validation",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2017-0247",
"https://github.com/aspnet/Announcements/issues/239",
"https://github.com/advisories/GHSA-6xh7-4v2w-36q6"
],
"uuid": "a9615297-044b-4506-aa12-259239535d9a"
},
{
"affected_range": "[4.0.0],[4.3.0]",
"affected_versions": "Version 4.0.0, version 4.3.0",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-707",
"CWE-937"
],
"date": "2021-07-01",
"description": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.",
"fixed_versions": [
"4.0.1",
"4.3.1"
],
"identifier": "CVE-2017-0247",
"identifiers": [
"GHSA-6xh7-4v2w-36q6",
"CVE-2017-0247"
],
"not_impacted": "All versions before 4.0.0, all versions after 4.0.0 before 4.3.0, all versions after 4.3.0",
"package_slug": "nuget/System.Net.Security",
"pubdate": "2018-10-16",
"solution": "Upgrade to versions 4.0.1, 4.3.1 or above.",
"title": "Improper Input Validation",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2017-0247",
"https://github.com/aspnet/Announcements/issues/239",
"https://github.com/advisories/GHSA-6xh7-4v2w-36q6"
],
"uuid": "f57c251c-326d-4207-b6e7-6c769d7c4be2"
},
{
"affected_range": "[4.0.0],[4.3.0]",
"affected_versions": "Version 4.0.0, version 4.3.0",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-707",
"CWE-937"
],
"date": "2021-07-01",
"description": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.",
"fixed_versions": [
"4.0.1",
"4.3.1"
],
"identifier": "CVE-2017-0247",
"identifiers": [
"GHSA-6xh7-4v2w-36q6",
"CVE-2017-0247"
],
"not_impacted": "All versions before 4.0.0, all versions after 4.0.0 before 4.3.0, all versions after 4.3.0",
"package_slug": "nuget/System.Net.WebSockets.Client",
"pubdate": "2018-10-16",
"solution": "Upgrade to versions 4.0.1, 4.3.1 or above.",
"title": "Improper Input Validation",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2017-0247",
"https://github.com/aspnet/Announcements/issues/239",
"https://github.com/advisories/GHSA-6xh7-4v2w-36q6"
],
"uuid": "cccf702d-9bc3-4885-a598-dbdb513ffcd9"
},
{
"affected_range": "[4.0.0],[4.3.0]",
"affected_versions": "Version 4.0.0, version 4.3.0",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-707",
"CWE-937"
],
"date": "2021-07-01",
"description": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.",
"fixed_versions": [
"4.0.1",
"4.3.1"
],
"identifier": "CVE-2017-0247",
"identifiers": [
"GHSA-6xh7-4v2w-36q6",
"CVE-2017-0247"
],
"not_impacted": "All versions before 4.0.0, all versions after 4.0.0 before 4.3.0, all versions after 4.3.0",
"package_slug": "nuget/System.Text.Encodings.Web",
"pubdate": "2018-10-16",
"solution": "Upgrade to versions 4.0.1, 4.3.1 or above.",
"title": "Improper Input Validation",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2017-0247",
"https://github.com/aspnet/Announcements/issues/239",
"https://github.com/advisories/GHSA-6xh7-4v2w-36q6"
],
"uuid": "9260bd88-c528-4323-9de2-76ca43b8ae72"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:microsoft:asp.net_model_view_controller:1.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:asp.net_model_view_controller:1.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:asp.net_model_view_controller:1.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.abstractions:1.0.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.apiexplorer:1.1.2:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:asp.net_model_view_controller:1.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:asp.net_model_view_controller:1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:asp.net_model_view_controller:1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.dataannotations:1.0.2:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.dataannotations:1.0.3:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.dataannotations:1.1.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.dataannotations:1.1.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.xml:1.1.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.xml:1.1.2:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.localization:1.0.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.localization:1.0.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor.host:1.0.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor.host:1.0.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor.host:1.0.2:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor.host:1.0.3:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor.host:1.1.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.viewfeatures:1.0.3:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.viewfeatures:1.1.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.viewfeatures:1.1.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.viewfeatures:1.1.2:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:system.net.websockets.client:4.0.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:system.net.websockets.client:4.3.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:system.text.encodings.web:4.0.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:system.text.encodings.web:4.3.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:asp.net_model_view_controller:1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:asp.net_model_view_controller:1.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.abstractions:1.0.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.abstractions:1.0.3:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.apiexplorer:1.0.3:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.apiexplorer:1.1.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:asp.net_model_view_controller:1.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:asp.net_model_view_controller:1.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.cors:1.0.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.cors:1.1.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.dataannotations:1.0.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.json:1.0.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.json:1.0.2:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.xml:1.0.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.xml:1.0.2:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.xml:1.1.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.localization:1.0.2:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.localization:1.1.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor:1.1.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor:1.1.2:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor.host:1.1.2:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.taghelpers:1.0.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.taghelpers:1.1.2:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.viewfeatures:1.0.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.webapicompatshim:1.0.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.webapicompatshim:1.0.3:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:system.net.http.winhttphandler:4.3.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:system.net.security:4.3.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.abstractions:1.1.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.abstractions:1.1.2:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.apiexplorer:1.0.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.apiexplorer:1.0.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.cors:1.0.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.cors:1.0.2:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.cors:1.0.3:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.cors:1.1.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.json:1.0.3:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.json:1.1.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.json:1.1.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.json:1.1.2:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.localization:1.1.2:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor:1.0.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor:1.0.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor:1.0.2:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.taghelpers:1.0.2:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.taghelpers:1.0.3:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.taghelpers:1.1.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.taghelpers:1.1.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.webapicompatshim:1.1.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.webapicompatshim:1.1.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.webapicompatshim:1.1.2:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:system.net.http:4.1.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:system.net.http:4.3.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:asp.net_model_view_controller:1.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:asp.net_model_view_controller:1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.abstractions:1.0.2:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.abstractions:1.1.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.apiexplorer:1.0.2:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.apiexplorer:1.1.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:asp.net_model_view_controller:1.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:asp.net_model_view_controller:1.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.cors:1.1.2:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.dataannotations:1.0.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.dataannotations:1.1.2:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.json:1.0.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.xml:1.0.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.xml:1.0.3:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.localization:1.0.3:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.localization:1.1.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor:1.0.3:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor:1.1.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor.host:1.1.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.taghelpers:1.0.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.viewfeatures:1.0.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.viewfeatures:1.0.2:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.webapicompatshim:1.0.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.webapicompatshim:1.0.2:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:system.net.http.winhttphandler:4.0.1:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:system.net.security:4.0.0:*:*:*:*:asp.net:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2017-0247"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/aspnet/Announcements/issues/239",
"refsource": "MISC",
"tags": [
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/aspnet/Announcements/issues/239"
},
{
"name": "https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS"
},
{
"name": "https://technet.microsoft.com/en-us/library/security/4021279.aspx",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://technet.microsoft.com/en-us/library/security/4021279.aspx"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2021-06-30T16:54Z",
"publishedDate": "2017-05-12T14:29Z"
}
}
}
FKIE_CVE-2017-0247
Vulnerability from fkie_nvd - Published: 2017-05-12 14:29 - Updated: 2025-04-20 01:37
Severity ?
Summary
A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.
References
| URL | Tags | ||
|---|---|---|---|
| secure@microsoft.com | https://github.com/aspnet/Announcements/issues/239 | Technical Description, Third Party Advisory | |
| secure@microsoft.com | https://technet.microsoft.com/en-us/library/security/4021279.aspx | Patch, Vendor Advisory | |
| secure@microsoft.com | https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/aspnet/Announcements/issues/239 | Technical Description, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://technet.microsoft.com/en-us/library/security/4021279.aspx | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS | Exploit, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:asp.net_model_view_controller:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "72D49ACA-0755-425C-9162-8D40D7AADDC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:asp.net_model_view_controller:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB52597-3458-4816-8432-7948CA21B8C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:asp.net_model_view_controller:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2FEB20C7-882C-44DB-86BF-FC56D4B5CD2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:asp.net_model_view_controller:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "86207D1B-AE1B-4826-B07A-75815A5ED06B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:asp.net_model_view_controller:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E96E6585-EA7C-47A7-B6EF-9926758E90DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:asp.net_model_view_controller:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "292C4DAD-1CBB-41DF-9E45-F8D594C03097",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:asp.net_model_view_controller:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2A5B65AF-6AE0-4CB0-9877-E8EF1C1A1D8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.abstractions:1.0.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "E7A0531D-F1A2-46D8-B8A4-AE53BC691C3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.abstractions:1.0.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "BC76DD26-1A09-419D-9156-16042FF7D508",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.abstractions:1.0.2:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "2A701C76-6AC7-4230-B0C5-9CD91010349C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.abstractions:1.0.3:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "6E801676-656E-43F6-8C4E-EE0BD5EAF23E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.abstractions:1.1.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "69E0C257-E39A-4404-AFE5-4D15BFA2DD7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.abstractions:1.1.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "DE818227-C9F3-49BA-80D1-FA49FA46B8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.abstractions:1.1.2:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "B7E8D173-9F85-4796-8A97-A77A531A3C79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.apiexplorer:1.0.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "893BD886-23DC-41E9-9DD1-C367F1638CFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.apiexplorer:1.0.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "BA58DBE2-9E83-4D69-A8DD-AB4E0CBD17D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.apiexplorer:1.0.2:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "2F9CCC49-348F-44A3-8412-17B689B0B0B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.apiexplorer:1.0.3:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "40ACE580-63FC-44A6-A1A3-19113BCF96B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.apiexplorer:1.1.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "88D4AEE2-23B8-4FE6-A118-66735EF8BA5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.apiexplorer:1.1.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "3A31726B-E001-4568-9538-150C438D4D82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.apiexplorer:1.1.2:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "22473819-A864-4568-BB4F-B1B61D6BE768",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.cors:1.0.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "25F6E532-9282-4444-BE83-1D4254B78E98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.cors:1.0.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "3D3B725F-E01E-4B44-B6FE-D384CB081880",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.cors:1.0.2:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "CD9CA7E6-4622-48CE-87DD-43850E6A3D94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.cors:1.0.3:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "9F0BE208-E908-4D55-ABC0-01899A7BCF3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.cors:1.1.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "BEB9143D-39A5-4A1A-8CF6-50A234476914",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.cors:1.1.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "784D8767-E542-4BEA-AC04-190EB86ACE44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.cors:1.1.2:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "B051C0F9-2D90-4F21-A4A3-49E52E4580F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.dataannotations:1.0.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "24849B2C-4475-4F63-99F8-D63AC7455AFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.dataannotations:1.0.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "E53251EE-7C63-4597-817D-E0E046D45E7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.dataannotations:1.0.2:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "C4B607A3-3637-4785-A7FA-074B370B57A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.dataannotations:1.0.3:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "10769FE6-90C1-41EF-B59C-2DF602798AA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.dataannotations:1.1.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "BEE6B70C-4E71-4EA2-9B3A-1B118CEE8461",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.dataannotations:1.1.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "9F2FF0F8-0447-442F-99C7-AAE364942263",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.dataannotations:1.1.2:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "82A352B2-00B5-40EB-A053-3871999FF549",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.json:1.0.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "1CBD8554-F155-4265-9ABA-27F2CFDB6645",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.json:1.0.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "1D0612F5-8621-4FEB-B84D-6116CD92C671",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.json:1.0.2:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "D917236C-B53D-454C-9FCD-4D0F48849C8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.json:1.0.3:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "B337AA31-B98C-47BD-B5C3-F2699FD0F3FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.json:1.1.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "32B849F2-CD4B-45DB-86DD-77248ED82C56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.json:1.1.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "3FAB9E0E-D0D9-45F6-88CA-F16F859C33C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.json:1.1.2:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "5A08EDE3-035D-4A4F-AF2A-FDFC02264841",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.xml:1.0.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "28A15818-8AB8-4253-9D82-D968B05D4416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.xml:1.0.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "C59BDECB-3184-4BE3-91B5-4703170D6E72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.xml:1.0.2:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "F861A072-D917-4BF5-99D3-3C9AD99A70EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.xml:1.0.3:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "79F08C0E-5A28-4A8D-9987-CC273A38CDB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.xml:1.1.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "F8A9187E-AAF3-4186-9014-13D304463F44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.xml:1.1.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "19022A88-C140-4C64-8BAD-43CE0E448D78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.formatters.xml:1.1.2:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "36170C72-162C-44F1-8291-DCF12AAC3D06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.localization:1.0.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "97E0DE96-A8CA-4395-8955-3223754A7678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.localization:1.0.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "95D892B0-08CD-479B-8DBA-2E296A2139EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.localization:1.0.2:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "18B1353C-D7FF-4B05-A0E0-17E06BB0BB01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.localization:1.0.3:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "16E5978D-49B7-4948-A57F-D0903CC2726B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.localization:1.1.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "D9FA1BA0-6E3F-46FD-BBEC-0546A3B973B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.localization:1.1.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "175E800A-6295-4EDD-AD76-AED50C4ED29F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.localization:1.1.2:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "DD429092-758C-40E2-9B62-552062DE5C99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor:1.0.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "4B124905-C4EB-4943-BF9D-97DD9C63C773",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor:1.0.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "F1382D94-3442-4770-99BC-A803DB7D99CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor:1.0.2:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "CCF8ED4C-E275-4CCD-8D37-EFBB858731FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor:1.0.3:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "72682900-3DEA-43E8-9E60-04D8AA575353",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor:1.1.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "2614708B-D88A-45D1-989A-EC1F18B2ECF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor:1.1.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "744B9E1F-ADB9-4B4B-AFAD-EAD5C91EEBAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor:1.1.2:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "A43E17E5-B98E-4ED2-8745-DCEEBF7D122D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor.host:1.0.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "48101840-E58F-4E2D-BA2D-8D07F76E1EB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor.host:1.0.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "20669ACD-4EA1-4B4A-A26B-E4F702B7FB50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor.host:1.0.2:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "7FC1D9F9-FFC7-46DD-B5BD-518198BD6B7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor.host:1.0.3:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "56285B40-74FB-4AE4-9998-09D3CC2FA76B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor.host:1.1.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "4322AC03-A133-4778-A2F1-AD509764BB00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor.host:1.1.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "E4779EAE-28C3-454F-853C-45D7A4B264BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.razor.host:1.1.2:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "34EB1A01-873A-4395-84D9-B048E2E12A43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.taghelpers:1.0.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "389FB05C-C41F-4162-B868-472A6FEE18BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.taghelpers:1.0.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "EBE430A8-4D97-4BAC-ABCE-4FE10766B8C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.taghelpers:1.0.2:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "4A657B85-FF9B-4ED8-BAEE-1BABC7CA2955",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.taghelpers:1.0.3:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "944C87F4-591A-46A3-A6BE-68CF070D2557",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.taghelpers:1.1.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "83FB8E69-0103-4FAA-94D8-DA1FDF0532BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.taghelpers:1.1.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "6A5CA6EF-184A-4D35-A430-8D708041C139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.taghelpers:1.1.2:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "7264CABF-8603-445F-8728-A53575239BC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.viewfeatures:1.0.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "776B722D-0DA6-4994-9323-06165E562489",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.viewfeatures:1.0.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "77A16675-CD3A-427B-888E-B1D8A51189AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.viewfeatures:1.0.2:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "B28A24AD-C225-45B3-8156-5A8107A7073C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.viewfeatures:1.0.3:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "DF9D2BE0-A57B-40B8-821F-65C29D9E6CD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.viewfeatures:1.1.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "22B75008-7F05-4923-88D9-0D6619568C8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.viewfeatures:1.1.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "C4A5D3CC-282D-484F-99E3-5D087F759C4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.viewfeatures:1.1.2:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "8799CB21-5F98-4368-A1BC-2746438757CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.webapicompatshim:1.0.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "7A2D0F4D-432E-4E3F-AFC4-5FE00BBA309E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.webapicompatshim:1.0.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "B4315F2E-5272-4D09-80AF-A65AE52E37CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.webapicompatshim:1.0.2:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "9CCD4355-CE24-4F14-A348-BB76470E4DC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.webapicompatshim:1.0.3:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "FF31C77E-67CA-481E-B4E2-2AE2941A4CB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.webapicompatshim:1.1.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "79D7994A-ABDF-4F02-841D-B082917CA9F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.webapicompatshim:1.1.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "7B33EFE6-68BB-46FD-834D-B767641E1AC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:microsoft.aspnetcore.mvc.webapicompatshim:1.1.2:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "71FFFD6C-1243-480F-874E-3548EED2D471",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:system.net.http:4.1.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "76906A3F-9A22-453F-BCCF-35C248E6788C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:system.net.http:4.3.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "E7A176BB-A188-44A9-9E52-D385B13D328F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:system.net.http.winhttphandler:4.0.1:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "DF881FCD-8E4C-47AC-ABED-05F805D3DED8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:system.net.http.winhttphandler:4.3.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "06C3E2C7-C113-4224-8F4F-3BDD3B800B04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:system.net.security:4.0.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "EE31A209-11BA-45CB-8DC7-8E6CCBCEEC36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:system.net.security:4.3.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "F376D1B3-5801-4BC3-B060-39DC928A9838",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:system.net.websockets.client:4.0.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "2EBDCB70-2C4C-4EDC-8DF9-6CA99732F404",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:system.net.websockets.client:4.3.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "0ACC7FBF-34A3-4A95-A7B0-396AB194976A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:system.text.encodings.web:4.0.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "AA8408AC-5380-4C77-BA49-C236F0CBB51F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:system.text.encodings.web:4.3.0:*:*:*:*:asp.net:*:*",
"matchCriteriaId": "E73FEB32-4CCB-460F-BC5B-E9BBFB8A6F66",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range."
},
{
"lang": "es",
"value": "Se presenta una vulnerabilidad de denegaci\u00f3n de servicio cuando el Core de ASP.NET no puede comprobar apropiadamente las peticiones web. NOTA: Microsoft no ha comentado en reclamos de terceros de que el problema es que la funci\u00f3n TextEncoder.EncodeCore en el paquete System.Text.Encodings.Web en ASP.NET Core Mvc versiones anteriores a 1.0.4 y versiones 1.1.x anteriores a 1.1.3 permite a los atacantes remotos causar una denegaci\u00f3n de servicio aprovechando un fallo en calcular apropiadamente la longitud de los caracteres de 4 bytes en el rango sin car\u00e1cter Unicode."
}
],
"id": "CVE-2017-0247",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-05-12T14:29:03.910",
"references": [
{
"source": "secure@microsoft.com",
"tags": [
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/aspnet/Announcements/issues/239"
},
{
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://technet.microsoft.com/en-us/library/security/4021279.aspx"
},
{
"source": "secure@microsoft.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/aspnet/Announcements/issues/239"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://technet.microsoft.com/en-us/library/security/4021279.aspx"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-6XH7-4V2W-36Q6
Vulnerability from github – Published: 2018-10-16 19:58 – Updated: 2022-04-26 19:07
VLAI?
Summary
ASP.NET Core fails to properly validate web requests
Details
A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.
Severity ?
7.5 (High)
{
"affected": [
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc"
},
"ranges": [
{
"events": [
{
"introduced": "1.0.0"
},
{
"fixed": "1.0.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc"
},
"ranges": [
{
"events": [
{
"introduced": "1.1.0"
},
{
"fixed": "1.1.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.Core"
},
"ranges": [
{
"events": [
{
"introduced": "1.0.0"
},
{
"fixed": "1.0.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.Core"
},
"ranges": [
{
"events": [
{
"introduced": "1.1.0"
},
{
"fixed": "1.1.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "System.Net.Http"
},
"ranges": [
{
"events": [
{
"introduced": "4.1.1"
},
{
"fixed": "4.1.2"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"4.1.1"
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "System.Net.Http"
},
"ranges": [
{
"events": [
{
"introduced": "4.3.1"
},
{
"fixed": "4.3.2"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"4.3.1"
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "System.Text.Encodings.Web"
},
"ranges": [
{
"events": [
{
"introduced": "4.0.0"
},
{
"fixed": "4.0.1"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"4.0.0"
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "System.Text.Encodings.Web"
},
"ranges": [
{
"events": [
{
"introduced": "4.3.0"
},
{
"fixed": "4.3.1"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"4.3.0"
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "System.Net.Http.WinHttpHandler"
},
"ranges": [
{
"events": [
{
"introduced": "4.0.0"
},
{
"fixed": "4.0.1"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"4.0.0"
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "System.Net.Http.WinHttpHandler"
},
"ranges": [
{
"events": [
{
"introduced": "4.3.0"
},
{
"fixed": "4.5.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "System.Net.Security"
},
"ranges": [
{
"events": [
{
"introduced": "4.0.0"
},
{
"fixed": "4.0.1"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"4.0.0"
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "System.Net.Security"
},
"ranges": [
{
"events": [
{
"introduced": "4.3.0"
},
{
"fixed": "4.3.1"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"4.3.0"
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "System.Net.WebSockets.Client"
},
"ranges": [
{
"events": [
{
"introduced": "4.0.0"
},
{
"fixed": "4.0.1"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"4.0.0"
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "System.Net.WebSockets.Client"
},
"ranges": [
{
"events": [
{
"introduced": "4.3.0"
},
{
"fixed": "4.3.1"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"4.3.0"
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.Abstractions"
},
"ranges": [
{
"events": [
{
"introduced": "1.0.0"
},
{
"fixed": "1.0.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.Abstractions"
},
"ranges": [
{
"events": [
{
"introduced": "1.1.0"
},
{
"fixed": "1.1.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.ApiExplorer"
},
"ranges": [
{
"events": [
{
"introduced": "1.0.0"
},
{
"fixed": "1.0.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.ApiExplorer"
},
"ranges": [
{
"events": [
{
"introduced": "1.1.0"
},
{
"fixed": "1.1.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.Cors"
},
"ranges": [
{
"events": [
{
"introduced": "1.0.0"
},
{
"fixed": "1.0.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.Cors"
},
"ranges": [
{
"events": [
{
"introduced": "1.1.0"
},
{
"fixed": "1.1.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.DataAnnotations"
},
"ranges": [
{
"events": [
{
"introduced": "1.0.0"
},
{
"fixed": "1.0.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.DataAnnotations"
},
"ranges": [
{
"events": [
{
"introduced": "1.1.0"
},
{
"fixed": "1.1.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.Formatters.Json"
},
"ranges": [
{
"events": [
{
"introduced": "1.0.0"
},
{
"fixed": "1.0.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.Formatters.Json"
},
"ranges": [
{
"events": [
{
"introduced": "1.1.0"
},
{
"fixed": "1.1.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.Formatters.Xml"
},
"ranges": [
{
"events": [
{
"introduced": "1.0.0"
},
{
"fixed": "1.0.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.Formatters.Xml"
},
"ranges": [
{
"events": [
{
"introduced": "1.1.0"
},
{
"fixed": "1.1.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.Localization"
},
"ranges": [
{
"events": [
{
"introduced": "1.0.0"
},
{
"fixed": "1.0.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.Localization"
},
"ranges": [
{
"events": [
{
"introduced": "1.1.0"
},
{
"fixed": "1.1.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.Razor.Host"
},
"ranges": [
{
"events": [
{
"introduced": "1.0.0"
},
{
"fixed": "1.0.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.Razor.Host"
},
"ranges": [
{
"events": [
{
"introduced": "1.1.0"
},
{
"fixed": "1.1.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.Razor"
},
"ranges": [
{
"events": [
{
"introduced": "1.0.0"
},
{
"fixed": "1.0.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.Razor"
},
"ranges": [
{
"events": [
{
"introduced": "1.1.0"
},
{
"fixed": "1.1.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.TagHelpers"
},
"ranges": [
{
"events": [
{
"introduced": "1.0.0"
},
{
"fixed": "1.0.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.TagHelpers"
},
"ranges": [
{
"events": [
{
"introduced": "1.1.0"
},
{
"fixed": "1.1.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.ViewFeatures"
},
"ranges": [
{
"events": [
{
"introduced": "1.0.0"
},
{
"fixed": "1.0.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.ViewFeatures"
},
"ranges": [
{
"events": [
{
"introduced": "1.1.0"
},
{
"fixed": "1.1.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.WebApiCompatShim"
},
"ranges": [
{
"events": [
{
"introduced": "1.0.0"
},
{
"fixed": "1.0.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Microsoft.AspNetCore.Mvc.WebApiCompatShim"
},
"ranges": [
{
"events": [
{
"introduced": "1.1.0"
},
{
"fixed": "1.1.3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2017-0247"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T21:20:41Z",
"nvd_published_at": "2017-05-12T14:29:00Z",
"severity": "HIGH"
},
"details": "A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.",
"id": "GHSA-6xh7-4v2w-36q6",
"modified": "2022-04-26T19:07:08Z",
"published": "2018-10-16T19:58:05Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0247"
},
{
"type": "WEB",
"url": "https://github.com/aspnet/Announcements/issues/239"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-6xh7-4v2w-36q6"
},
{
"type": "WEB",
"url": "https://technet.microsoft.com/en-us/library/security/4021279.aspx"
},
{
"type": "WEB",
"url": "https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
],
"summary": "ASP.NET Core fails to properly validate web requests"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…