{"id":"CVE-2024-0057","details":"NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability","aliases":["BIT-dotnet-2024-0057","BIT-dotnet-sdk-2024-0057","BIT-powershell-2024-0057","GHSA-68w7-72jg-6qpp"],"modified":"2026-04-10T05:07:50.174871Z","published":"2024-01-09T18:15:46.980Z","related":["ALSA-2024:0150","ALSA-2024:0151","ALSA-2024:0152","ALSA-2024:0156","ALSA-2024:0157","ALSA-2024:0158","CGA-4j6j-74rw-xj2r"],"references":[{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240208-0007/"},{"type":"FIX","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0057"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dotnet/core","events":[{"introduced":"0"},{"last_affected":"db80d23845503f74f69f84c3d525d9e3ea1e4811"},{"introduced":"ee849590a02cc5cd61eff18aa64bf985ec45124d"},{"fixed":"73deb1784e9f579ce38c044f8cad095c5d4e4f93"},{"introduced":"63772e2191a750dd3cafa75914cacdb038c7520c"},{"fixed":"73deb1784e9f579ce38c044f8cad095c5d4e4f93"},{"introduced":"0"},{"last_affected":"d78b3180414d35d6c7d136db753474e2ae2b33df"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.0-sp2"},{"introduced":"6.0.0"},{"fixed":"6.0.26"},{"introduced":"7.0.0"},{"fixed":"7.0.15"},{"introduced":"0"},{"last_affected":"8.0.0-NA"}]}},{"type":"GIT","repo":"https://github.com/powershell/powershell","events":[{"introduced":"bec5c36d9da67bfcf5b88834f03b326c89f100c5"},{"fixed":"f9875048c636790bc02fe7d7cc801c1cde14ea75"},{"introduced":"71d127320cdbeffe7d141b94d8a20b580d401591"},{"fixed":"d68aa89daf9b28b23f0675c355b7be0b8795cd82"},{"introduced":"0"},{"last_affected":"1393d167f54466ec60c547b56f0c4d8326da7dc8"}],"database_specific":{"versions":[{"introduced":"7.2"},{"fixed":"7.2.18"},{"introduced":"7.3"},{"fixed":"7.3.11"},{"introduced":"0"},{"last_affected":"7.4-NA"}]}}],"versions":["v0.1.0","v0.2.0","v0.3.0","v0.4.0","v0.5.0","v0.6.0","v1.0.0","v1.0.0-rc1","v1.0.0-rc2","v1.0.1","v1.0.10","v1.0.11","v1.0.12","v1.0.13","v1.0.14","v1.0.15","v1.0.16","v1.0.2","v1.0.3","v1.0.4","v1.0.5","v1.0.7","v1.0.8","v1.0.9","v1.1","v1.1.0","v1.1.0-preview1","v1.1.1","v1.1.10","v1.1.11","v1.1.12","v1.1.13","v1.1.2","v1.1.4","v1.1.5","v1.1.6","v1.1.7","v1.1.8","v1.1.9","v2.0.0","v2.0.0-preview1","v2.0.0-preview2","v2.0.3","v2.0.4","v2.0.5","v2.0.6","v2.0.7","v2.0.7-2","v2.0.9","v2.1-preview1","v2.1-preview2","v2.1-rc1","v2.1.0","v2.1.1","v2.1.11","v2.1.12","v2.1.13","v2.1.14","v2.1.2","v2.1.3","v2.1.4","v2.1.5","v2.1.6","v2.1.7","v2.1.8","v2.1.9","v2.2.0","v2.2.0-preview1","v2.2.0-preview3","v2.2.1","v2.2.2","v2.2.3","v2.2.5","v2.2.6","v2.2.7","v2.2.8","v3.0.0","v3.0.0-preview1","v3.0.0-preview2","v3.0.0-preview3","v3.0.0-preview4","v3.0.0-preview5","v3.0.0-preview6","v3.0.0-preview7","v3.0.0-preview8","v3.0.0-preview9","v3.0.0-rc1","v3.0.1","v3.0.2","v3.1.0","v3.1.0-preview1","v3.1.0-preview2","v3.1.0-preview3","v3.1.1","v3.1.31","v3.1.32","v6.0.0-alpha.10","v6.0.0-alpha.11","v6.0.0-alpha.12","v6.0.0-alpha.13","v6.0.0-alpha.16","v6.0.0-alpha.17","v6.0.0-alpha.18","v6.0.0-alpha.7","v6.0.0-alpha.9","v6.0.0-beta.1","v6.0.0-beta.2","v6.0.11","v6.0.12","v6.0.13","v6.0.14","v6.0.15","v6.0.16","v6.0.18","v6.0.19","v6.0.20","v6.0.21","v6.0.22","v6.0.23","v6.0.24","v6.0.25","v7.0.0","v7.0.1","v7.0.10","v7.0.11","v7.0.12","v7.0.13","v7.0.14","v7.0.2","v7.0.3","v7.0.4","v7.0.5","v7.0.7","v7.0.8","v7.0.9","v7.2.0","v7.2.1","v7.2.10","v7.2.11","v7.2.12","v7.2.13","v7.2.14","v7.2.15","v7.2.16","v7.2.17","v7.2.2","v7.2.3","v7.2.4","v7.2.5","v7.2.6","v7.2.7","v7.2.8","v7.2.9","v7.3.0","v7.3.1","v7.3.10","v7.3.2","v7.3.3","v7.3.4","v7.3.5","v7.3.6","v7.3.7","v7.3.8","v7.3.9","v7.4.0","v7.4.0-preview.5","v7.4.0-preview.6","v7.4.0-rc.1","v8.0.0","v8.0.0-preview.1","v8.0.0-preview.2","v8.0.0-preview.3","v8.0.0-preview.4","v8.0.0-preview.5","v8.0.0-preview.6","v8.0.0-preview.7","v8.0.0-rc.1","v8.0.0-rc.2"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"17.2"},{"fixed":"17.2.23"}]},{"events":[{"introduced":"17.4"},{"fixed":"17.4.15"}]},{"events":[{"introduced":"17.6"},{"fixed":"17.6.11"}]},{"events":[{"introduced":"17.8"},{"fixed":"17.8.4"}]},{"events":[{"introduced":"4.8"},{"fixed":"4.8.04690.02"}]},{"events":[{"introduced":"4.8"},{"fixed":"4.8.04690.01"}]},{"events":[{"introduced":"0"},{"last_affected":"4.6.2"}]},{"events":[{"introduced":"0"},{"last_affected":"4.7"}]},{"events":[{"introduced":"0"},{"last_affected":"4.7.1"}]},{"events":[{"introduced":"0"},{"last_affected":"4.7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"3.5"}]},{"events":[{"introduced":"0"},{"last_affected":"4.8.1"}]},{"events":[{"introduced":"4.8"},{"fixed":"4.8.04690.02"}]},{"events":[{"introduced":"0"},{"last_affected":"3.5"}]},{"events":[{"introduced":"0"},{"last_affected":"3.5"}]},{"events":[{"introduced":"0"},{"last_affected":"4.7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"2.0-sp2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-0057.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}