Security Updates for Microsoft Team Foundation Server / Azure DevOps Server (May 2019)

medium Nessus Plugin ID 125163

Synopsis

The Microsoft Team Foundation Server or Azure DevOps Server is affected by multiple vulnerabilities.

Description

The Microsoft Team Foundation Server or Azure DevOps Server is missing security updates. It is, therefore, affected by multiple vulnerabilities :

- An information disclosure vulnerability exists when Azure DevOps Server and Microsoft Team Foundation Server do not properly sanitize a specially crafted authentication request to an affected server. An attacker who successfully exploited this vulnerability could execute malicious code on a vulnerable server.
(CVE-2019-0971)

- A Cross-site Scripting (XSS) vulnerability exists when Azure DevOps Server and Team Foundation Server does not properly sanitize user provided input. An authenticated attacker could exploit the vulnerability by sending a specially crafted payload to an Azure DevOps server or a Team Foundation server, which will get executed in the context of the user every time a user visits the compromised page. The attacker who successfully exploited the vulnerability could then perform cross- site scripting attacks on affected systems and run script in the security context of the current user. The attacks could allow the attacker to read content that the attacker is not authorized to read, execute malicious code, and use the victim's identity to take actions on the site on behalf of the user, such as change permissions and delete content. The security update addresses the vulnerability by ensuring that Azure DevOps Server and Team Foundation Server properly sanitizes user input. (CVE-2019-0872, CVE-2019-0979)

Solution

Microsoft has released the following updates to address these issues:
- Team Foundation Server 2015 Update 4.2 w/ patch 1
- Team Foundation Server 2017 Update 3.1 w/ patch 5
- Team Foundation Server 2018 Update 1.2 w/ patch 4
- Team Foundation Server 2018 Update 3.2 w/ patch 4
- Azure DevOps Server 2019 RTW w/ patch 2

Please refer to the vendor guidance to determine the version and patch to apply.

See Also

http://www.nessus.org/u?b7e2c8f5

http://www.nessus.org/u?c6513ee5

http://www.nessus.org/u?f912b5e2

http://www.nessus.org/u?8b2dad36

http://www.nessus.org/u?7fb75469

http://www.nessus.org/u?35dc6160

Plugin Details

Severity: Medium

ID: 125163

File Name: smb_nt_ms19_may_team_foundation_server.nasl

Version: 1.8

Type: local

Agent: windows

Published: 5/15/2019

Updated: 12/5/2022

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2019-0971

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:visual_studio_team_foundation_server, cpe:/o:microsoft:azure_devops_server

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 5/14/2019

Vulnerability Publication Date: 5/14/2019

Reference Information

CVE: CVE-2019-0872, CVE-2019-0971, CVE-2019-0979

BID: 108205, 108206, 108239

MSFT: MS19-4464510, MS19-4464511, MS19-4464515, MS19-4464518, MS19-4464525, MS19-4464528

MSKB: 4464510, 4464511, 4464515, 4464518, 4464525, 4464528