{"id":"CVE-2024-0056","details":"Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability","aliases":["BIT-dotnet-2024-0056","BIT-dotnet-sdk-2024-0056","GHSA-98g6-xh36-x2p7"],"modified":"2026-04-10T05:07:50.133111Z","published":"2024-01-09T18:15:46.783Z","related":["ALSA-2024:0150","ALSA-2024:0151","ALSA-2024:0152","ALSA-2024:0156","ALSA-2024:0157","ALSA-2024:0158"],"references":[{"type":"FIX","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0056"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dotnet/core","events":[{"introduced":"e7dd0cd3ff917f087f7af2163006d7df6827438b"},{"fixed":"fe04ad9ed048288b5e44e5eb307145d0302337d7"},{"introduced":"5c0a0489d157ca82fca6f9b73c682f118e8c4a8a"},{"fixed":"953482a858b64b7c7c482f69e69a0724609c6c7a"},{"introduced":"ee849590a02cc5cd61eff18aa64bf985ec45124d"},{"fixed":"73deb1784e9f579ce38c044f8cad095c5d4e4f93"},{"introduced":"63772e2191a750dd3cafa75914cacdb038c7520c"},{"fixed":"73deb1784e9f579ce38c044f8cad095c5d4e4f93"},{"introduced":"0"},{"last_affected":"d78b3180414d35d6c7d136db753474e2ae2b33df"}],"database_specific":{"versions":[{"introduced":"2.1"},{"fixed":"2.1.7"},{"introduced":"3.1"},{"fixed":"3.1.5"},{"introduced":"6.0.0"},{"fixed":"6.0.26"},{"introduced":"7.0.0"},{"fixed":"7.0.15"},{"introduced":"0"},{"last_affected":"8.0.0-NA"}]}}],"versions":["v1.0.12","v1.0.13","v1.1.10","v1.1.9","v2.0.9","v2.1.0","v2.1.1","v2.1.15","v2.1.16","v2.1.18","v2.1.2","v2.1.3","v2.1.4","v2.1.5","v2.1.6","v2.2.0","v2.2.0-preview1","v2.2.0-preview3","v3.0.0-preview1","v3.0.2","v3.0.3","v3.1.0","v3.1.1","v3.1.2","v3.1.200","v3.1.201","v3.1.3","v3.1.31","v3.1.32","v5.0.0-preview.2","v5.0.0-preview.3","v6.0.11","v6.0.12","v6.0.13","v6.0.14","v6.0.15","v6.0.16","v6.0.18","v6.0.19","v6.0.20","v6.0.21","v6.0.22","v6.0.23","v6.0.24","v6.0.25","v7.0.0","v7.0.1","v7.0.10","v7.0.11","v7.0.12","v7.0.13","v7.0.14","v7.0.2","v7.0.3","v7.0.4","v7.0.5","v7.0.7","v7.0.8","v7.0.9","v8.0.0","v8.0.0-preview.1","v8.0.0-preview.2","v8.0.0-preview.3","v8.0.0-preview.4","v8.0.0-preview.5","v8.0.0-preview.6","v8.0.0-preview.7","v8.0.0-rc.1","v8.0.0-rc.2"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"4.0"},{"fixed":"4.0.5"}]},{"events":[{"introduced":"5.1"},{"fixed":"5.1.3"}]},{"events":[{"introduced":"0"},{"last_affected":"2022"}]},{"events":[{"introduced":"0"},{"last_affected":"2022-cumulative_update_10"}]},{"events":[{"introduced":"0"},{"fixed":"4.8.6"}]},{"events":[{"introduced":"17.2"},{"fixed":"17.2.23"}]},{"events":[{"introduced":"17.4"},{"fixed":"17.4.15"}]},{"events":[{"introduced":"17.6"},{"fixed":"17.6.11"}]},{"events":[{"introduced":"17.8"},{"fixed":"17.8.4"}]},{"events":[{"introduced":"4.8"},{"fixed":"4.8.04690.02"}]},{"events":[{"introduced":"4.8"},{"fixed":"4.8.04690.01"}]},{"events":[{"introduced":"0"},{"last_affected":"4.6.2"}]},{"events":[{"introduced":"0"},{"last_affected":"4.7"}]},{"events":[{"introduced":"0"},{"last_affected":"4.7.1"}]},{"events":[{"introduced":"0"},{"last_affected":"4.7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"3.5"}]},{"events":[{"introduced":"0"},{"last_affected":"4.8.1"}]},{"events":[{"introduced":"4.8"},{"fixed":"4.8.04690.02"}]},{"events":[{"introduced":"0"},{"last_affected":"3.5"}]},{"events":[{"introduced":"0"},{"last_affected":"3.5"}]},{"events":[{"introduced":"0"},{"last_affected":"4.7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"2.0-sp2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-0056.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"}]}