Security Updates for Microsoft Team Foundation Server (November 2018)

critical Nessus Plugin ID 119017

Synopsis

The Microsoft Team Foundation Server installation on the remote host is affected by multiple vulnerabilities.

Description

The Microsoft Team Foundation Server installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities :

- A remote code execution vulnerability exists when Team Foundation Server (TFS) does not enable basic authorization on the communication between the TFS and Search services. Without basic authorization, an attacker could run certain commands on the Search service. (CVE-2018-8529)

- A Cross-site Scripting (XSS) vulnerability exists when Team Foundation Server does not properly sanitize user provided input.
An authenticated attacker could exploit the vulnerability by sending a specially crafted payload to the Team Foundation Server, which will get executed in the context of the user every time a user visits the compromised page. (CVE-2018-8602)

Solution

Microsoft has released the following updates to address these issues:
- Team Foundation Server 2017 Update 3.1 w/ patch
- Team Foundation Server 2018 Update 1.1 w/ patch
- Team Foundation Server 2018 Update 3 w/ patch
- Team Foundation Server 2018 Update 3.1

Please refer to the vendor guidance to determine the version and patch to apply.

See Also

http://www.nessus.org/u?02b9f204

http://www.nessus.org/u?f912b5e2

http://www.nessus.org/u?8b2dad36

http://www.nessus.org/u?7fb75469

Plugin Details

Severity: Critical

ID: 119017

File Name: smb_nt_ms18_nov_team_foundation_server.nasl

Version: 1.4

Type: local

Agent: windows

Published: 11/16/2018

Updated: 4/21/2020

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2018-8529

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:visual_studio_team_foundation_server

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 2/28/2018

Vulnerability Publication Date: 2/28/2018

Reference Information

CVE: CVE-2018-8529, CVE-2018-8602

BID: 105895, 105910