#VU74867 Spoofing attack in Visual Studio


Published: 2023-04-11 | Updated: 2023-06-08

Vulnerability identifier: #VU74867

Vulnerability risk: Medium

CVSSv3.1: 6.1 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2023-28299

CWE-ID: CWE-451

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Visual Studio
Universal components / Libraries / Software for developers

Vendor: Microsoft

Description

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to incorrect processing of newline characters in extension's name. A remote attacker can manually add newline characters to the tag <DisplayName> under the "extension.vsixmanifest" file, which will hide information about digital signature of an unsigned extension leading to a spoofing attack.

Successful exploitation of the vulnerability will require a victim to install a malicious extension.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Visual Studio: 17.2.0 17.2.32505.173, 17.0.0 17.0.31903.59, 17.4.0 17.4.33103.184, 17.5.0 17.5.33414.496, 16.11.0 16.11.31605.320, 16.10, 16.9, 16.8, 16.7, 16.6, 16.5, 16.4, 16.3, 16.2, 16.1, 16.0, 2017 version 15.9, 2017 version 15.8, 2017 version 15.0


External links
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28299
http://www.varonis.com/blog/visual-studio-bug


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability