Information Exposure Affecting dsinternals.common package, versions [2.21,4.8)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DOTNET-DSINTERNALSCOMMON-3160313
  • published7 Dec 2022
  • disclosed6 Dec 2022
  • creditUnknown

Introduced: 6 Dec 2022

CVE-2022-30170  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade DSInternals.Common to version 4.8 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure in the DSInternals.Common.Data.RoamedCredential.Save() method, which incorrectly parses the msPKIAccountCredentials LDAP attribute values. Consequently, a malicious actor would be able to modify the computer's file system where an application using this function is executed with administrative privileges.

Note: The vulnerability can be exploited only under the following circumstances:

  1. An attacker can modify the msPKIAccountCredentials attribute of a user account in Active Directory. This attribute is used by the Credential Roaming feature of Windows and each AD user can modify their own roamed credentials. AND

  2. A 3rd party application uses the DSInternals.Common library to export roamed credentials from Active Directory to a file system. AND

  3. The application has administrative privileges on the local system.

The probability of any 3rd-party product using the DSInternals.Common library being affected by this vulnerability is extremely low.

CVSS Scores

version 3.1