MS13-103: Vulnerability in ASP.NET SignalR Could Allow Elevation of Privilege (2905244)

Medium Nessus Plugin ID 71318


The remote host has an application that is affected by a cross-site scripting vulnerability.


The remote host is running a version of ASP.NET SignalR that is affected by a cross-site scripting vulnerability that results in privilege escalation. An attacker who successfully exploited this vulnerability could take any action that the targeted user could take on the site.


Microsoft has released a set of patches for Visual Studio Team Foundation Server 2013 and ASP.NET SignalR.

See Also

Plugin Details

Severity: Medium

ID: 71318

File Name: smb_nt_ms13-103.nasl

Version: 1.10

Type: local

Agent: windows

Published: 2013/12/11

Updated: 2018/11/15

Dependencies: 57033, 13855, 62033, 10395

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:asp.net_signalr, cpe:/a:microsoft:visual_studio_team_foundation_server

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/12/10

Vulnerability Publication Date: 2013/12/10

Reference Information

CVE: CVE-2013-5042

BID: 64093

MSFT: MS13-103

MSKB: 2903566, 2903919

IAVA: 2013-A-0224