-
Notifications
You must be signed in to change notification settings - Fork 1.4k
Microsoft Security Advisory CVE-2025-26646: .NET Spoofing Vulnerability #11846
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
This issue indicates that the latest version of the SDK, e.g. 8.0.409 should have a fix for this. But I'm still seeing vulnerable versions of the package in question in that SDK? |
@chrispatrick I downloaded the sdk 8.0.409, decompiled the Microsoft.Build.Tasks.Core.dll and the fix is present. What makes you say it's not? |
I'm seeing version 17.7.2.37605 of Microsoft.Build.Tasks.Core.dll located at DotnetTools/dotnet-format/Microsoft.Build.Tasks.Core.dll Both in 8.0.409. Those versions of Microsoft.Build.Tasks.Core.dll are marked as vulnerable. |
|
OK, if we can get confirmation that the vulnerable part of those packages are not used as part of using the SDK then that's good enough for me, thanks! |
Will the same update be applied to the v8 SDK as well do you know? |
Or alternatively, could you confirm whether the library at |
Microsoft Security Advisory CVE-2025-26646: .NET Spoofing Vulnerability
Executive summary
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 9.0.xxx and .NET 8.0.xxx SDK. This advisory also provides guidance on what developers can do to update their applications to address this vulnerability.
A vulnerability exists in .NET SDK or MSBuild applications where external control of file name or path allows an unauthorized attacked to perform spoofing over a network.
Announcement
Announcement for this issue can be found at dotnet/announcements#356
Mitigation factors
Projects which do not utilize the DownloadFile build task are not susceptible to this vulnerability.
Affected software
Affected Packages
The vulnerability affects any Microsoft .NET Core project if it uses any of affected packages versions listed below
>=16.0.461, <= 16.11.0
>= 17.0.0, <= 17.8.3
>= 17.9.5, <= 17.10.4
17.11.4
17.12.6
17.13.9
16.11.6
17.8.29
17.10.29
17.12.36
17.13.26
17.14.8
Advisory FAQ
How do I know if I am affected?
If you have a .NET SDK with a version listed, or an affected package listed in affected software or affected packages, you're exposed to the vulnerability.
How do I fix the issue?
dotnet --info
command. You will see output like the following;If you're using .NET 9.0, you should download and install the appropriate SDK:
.NET 9.0.300
for Visual Studio 2022 v17.14,.NET 9.0.204
for v17.13, or.NET 9.0.106
for v17.12. Download from https://dotnet.microsoft.com/download/dotnet-core/9.0.If you're using .NET 8.0, you should download and install the appropriate SDK:
.NET 8.0.409
for Visual Studio 2022 v17.11,.NET 8.0.312
for v17.10, or.NET 8.0.116
for v17.8. Download from https://dotnet.microsoft.com/download/dotnet-core/8.0.Once you have installed the updated SDK, restart your apps for the update to take effect.
Other Information
Reporting Security Issues
If you have found a potential security issue in .NET 8.0 or .NET 9.0, please email details to [email protected]. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at https://aka.ms/corebounty.
Support
You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/aspnetcore. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.
Disclaimer
The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
External Links
CVE-2025-26646
Revisions
V1.0 (May 13, 2025): Advisory published.
Version 1.0
Last Updated 2025-05-13
The text was updated successfully, but these errors were encountered: