{"id":"CVE-2022-41032","details":"NuGet Client Elevation of Privilege Vulnerability","aliases":["BIT-dotnet-2022-41032","BIT-dotnet-sdk-2022-41032","GHSA-g3q9-xf95-8hp5"],"modified":"2026-03-15T14:47:47.038597Z","published":"2022-10-11T19:15:20.483Z","related":["ALSA-2022:6911","ALSA-2022:6912","ALSA-2022:6913","ALSA-2022:7826","ALSA-2022:8434"],"references":[{"type":"WEB","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41032"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FOG35Z5RL5W5RGLLYLN46CI4D2UPDSWM/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDPT2MJC3HD7HYZGASOOX6MTDR4ASBL5/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X7BMHO5ITRBZREVTEKHQRGSFRPDMALV3/"},{"type":"FIX","url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41032"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dotnet/core","events":[{"introduced":"0"},{"last_affected":"ee849590a02cc5cd61eff18aa64bf985ec45124d"},{"introduced":"0"},{"last_affected":"5c0a0489d157ca82fca6f9b73c682f118e8c4a8a"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"6.0.0-NA"},{"introduced":"0"},{"last_affected":"3.1-NA"}]}}],"versions":["v1.0.0","v1.0.0-rc1","v1.0.0-rc2","v1.0.1","v1.0.10","v1.0.11","v1.0.12","v1.0.13","v1.0.14","v1.0.15","v1.0.16","v1.0.2","v1.0.3","v1.0.4","v1.0.5","v1.0.7","v1.0.8","v1.0.9","v1.1","v1.1.0","v1.1.0-preview1","v1.1.1","v1.1.10","v1.1.11","v1.1.12","v1.1.13","v1.1.2","v1.1.4","v1.1.5","v1.1.6","v1.1.7","v1.1.8","v1.1.9","v2.0.0","v2.0.0-preview1","v2.0.0-preview2","v2.0.3","v2.0.4","v2.0.5","v2.0.6","v2.0.7","v2.0.7-2","v2.0.9","v2.1-preview1","v2.1-preview2","v2.1-rc1","v2.1.0","v2.1.1","v2.1.11","v2.1.12","v2.1.13","v2.1.14","v2.1.15","v2.1.16","v2.1.18","v2.1.2","v2.1.20","v2.1.22","v2.1.23","v2.1.24","v2.1.25","v2.1.29","v2.1.3","v2.1.30","v2.1.4","v2.1.5","v2.1.6","v2.1.7","v2.1.8","v2.1.9","v2.2.0","v2.2.0-preview1","v2.2.0-preview2","v2.2.0-preview3","v2.2.1","v2.2.2","v2.2.3","v2.2.5","v2.2.6","v2.2.7","v2.2.8","v3.0.0","v3.0.0-preview1","v3.0.0-preview2","v3.0.0-preview3","v3.0.0-preview4","v3.0.0-preview5","v3.0.0-preview6","v3.0.0-preview7","v3.0.0-preview8","v3.0.0-preview9","v3.0.0-rc1","v3.0.1","v3.0.2","v3.0.3","v3.1.0","v3.1.0-preview1","v3.1.0-preview2","v3.1.0-preview3","v3.1.1","v3.1.10","v3.1.11","v3.1.12","v3.1.13","v3.1.14","v3.1.15","v3.1.16","v3.1.17","v3.1.18","v3.1.19","v3.1.2","v3.1.20","v3.1.200","v3.1.201","v3.1.21","v3.1.3","v3.1.5","v3.1.6","v3.1.7","v3.1.8","v3.1.9","v5.0.0","v5.0.0-preview.2","v5.0.0-preview.3","v5.0.0-preview.4","v5.0.0-preview.5","v5.0.0-preview.6","v5.0.0-preview.7","v5.0.0-preview.8","v5.0.0-rc.1","v5.0.0-rc.2","v5.0.1","v5.0.10","v5.0.11","v5.0.12","v5.0.2","v5.0.3","v5.0.4","v5.0.5","v5.0.6","v5.0.7","v5.0.8","v5.0.9","v6.0.0","v6.0.0-preview.1","v6.0.0-preview.2","v6.0.0-preview.3","v6.0.0-preview.4","v6.0.0-preview.5","v6.0.0-preview.6","v6.0.0-preview.7","v6.0.0-rc.1","v6.0.0-rc.2"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"16.0.0"},{"fixed":"16.9.26"}]},{"events":[{"introduced":"16.10.0"},{"fixed":"16.11.20"}]},{"events":[{"introduced":"17.0"},{"fixed":"17.0.15"}]},{"events":[{"introduced":"17.2.0"},{"fixed":"17.2.9"}]},{"events":[{"introduced":"17.3"},{"fixed":"17.3.6"}]},{"events":[{"introduced":"17.3"},{"fixed":"17.3.7"}]},{"events":[{"introduced":"0"},{"last_affected":"35"}]},{"events":[{"introduced":"0"},{"last_affected":"36"}]},{"events":[{"introduced":"0"},{"last_affected":"37"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-41032.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}