Security Updates for Microsoft Team Foundation Server / Azure DevOps Server (April 2019)

high Nessus Plugin ID 123953

Synopsis

The Microsoft Team Foundation Server or Azure DevOps Server installation on the remote host is affected by

Description

The Microsoft Team Foundation Server or Azure DevOps Server installation on the remote host is missing a security update. It is, therefore, affected by multiple vulnerabilities :

- An elevation of privilege vulnerability exists when Azure DevOps Server 2019 does not properly enforce project permissions. An attacker who exploited the vulnerability could add GitHub repositories to a project without having the proper access granted to their account. (CVE-2019-0875)

- A spoofing vulnerability that could allow a security feature bypass exists in when Team Foundation Server does not properly sanitize user provided input. An attacker who exploited the vulnerability could trick a user into loading a page containing malicious content.
An authenticated attacker could exploit the vulnerability by sending a specially crafted payload to the Team Foundation Server, which would get executed in the context of the user every time a user visits the compromised page. (CVE-2019-0857)

- A spoofing vulnerability exists in Microsoft Team Foundation Server when it fails to properly handle web requests. An attacker who successfully exploited the vulnerability could perform script or content injection attacks, and attempt to trick the user into disclosing sensitive information. An attacker could also redirect the user to a malicious website that could spoof content or the vulnerability could be used as a pivot to chain an attack with other vulnerabilities in web services.
(CVE-2019-0869)

- A Cross-site Scripting (XSS) vulnerability exists when Team Foundation Server does not properly sanitize user provided input. An authenticated attacker could exploit the vulnerability by sending a specially crafted payload to the Team Foundation Server, which will get executed in the context of the user every time a user visits the compromised page. The attacker who successfully exploited the vulnerability could then perform cross- site scripting attacks on affected systems and run script in the security context of the current user. The attacks could allow the attacker to read content that the attacker is not authorized to read, execute malicious code, and use the victim's identity to take actions on the site on behalf of the user, such as change permissions and delete content. The security update addresses the vulnerability by ensuring that Team Foundation Server sanitizes user inputs. (CVE-2019-0866, CVE-2019-0867, CVE-2019-0868, CVE-2019-0870, CVE-2019-0871, CVE-2019-0874)

Solution

Microsoft has released the following updates to address these issues:
- Team Foundation Server 2015 Update 4.1
- Team Foundation Server 2017 Update 3.1 w/ patch
- Team Foundation Server 2018 Update 1.2 w/ patch
- Team Foundation Server 2018 Update 3.2 w/ patch
- Azure DevOps Server 2019 RTW w/ patch

Please refer to the vendor guidance to determine the version and patch to apply.

See Also

http://www.nessus.org/u?22c1a457

http://www.nessus.org/u?c6513ee5

http://www.nessus.org/u?f912b5e2

http://www.nessus.org/u?8b2dad36

http://www.nessus.org/u?7fb75469

http://www.nessus.org/u?35dc6160

Plugin Details

Severity: High

ID: 123953

File Name: smb_nt_ms19_apr_team_foundation_server.nasl

Version: 1.8

Type: local

Agent: windows

Published: 4/9/2019

Updated: 6/4/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2019-0875

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:visual_studio_team_foundation_server, cpe:/o:microsoft:azure_devops_server

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/9/2019

Vulnerability Publication Date: 4/9/2019

Reference Information

CVE: CVE-2019-0857, CVE-2019-0866, CVE-2019-0867, CVE-2019-0868, CVE-2019-0869, CVE-2019-0870, CVE-2019-0871, CVE-2019-0874, CVE-2019-0875

IAVA: 2019-A-0108-S