Summary
This host is missing an important security update according to Microsoft Bulletin MS13-103.
Impact
Successful exploitation will allow attackers to execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.
Impact Level: Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, https://technet.microsoft.com/en-us/security/bulletin/ms13-103
Insight
Flaw is due ASP.NET SignalR improperly encodes user input before returning it to the user.
Affected
Microsoft Visual Studio Team Foundation Server 2013
Detection
Get the vulnerable file version and check appropriate patch is applied or not.
References
Severity
Classification
-
CVE CVE-2013-5042 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- Microsoft InfoPath HTML Sanitisation Component XSS Vulnerability (2821818)
- Buffer Overflow in Windows Troubleshooter ActiveX Control (826232)
- Microsoft .NET Framework Denial of Service Vulnerability (2990931)
- Microsoft SharePoint Server Remote Code Execution Vulnerability (2904244)
- Microsoft Window XML Core Services Information Disclosure Vulnerability (2966061)