We have had the following pointed out to us:
URL | Description |
---|---|
https://www.cvedetails.com/cve/CVE-2015-6099/ | Cross-site scripting (XSS) vulnerability in ASP.NET in Microsoft .NET Framework 4, 4.5, 4.5.1, 4.5.2, and 4.6 allows remote attackers to inject arbitrary web script or HTML via a crafted value, aka ".NET Elevation of Privilege Vulnerability." |
https://www.cvedetails.com/cve/CVE-2015-2504/ | Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, and 4.6 improperly counts objects before performing an array copy, which allows remote attackers to (1) execute arbitrary code via a crafted XAML browser application (XBAP) or (2) bypass Code Access Security restrictions via a crafted .NET Framework application, aka ".NET Elevation of Privilege Vulnerability." |
https://www.cvedetails.com/cve/CVE-2011-3416 | The Forms Authentication feature in the ASP.NET subsystem in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5 SP1, 3.5.1, and 4.0 allows remote authenticated users to obtain access to arbitrary user accounts via a crafted username, aka "ASP.Net Forms Authentication Bypass Vulnerability." |
These are deemed to be an issue as our headers (x-aspnet-version) report running CLR 4.0.30319
Our code is built against .Net framework 4.8
The earliest of these issues is from 2011. How can any of them still be a problem? And yet our servers are running CLR 4.0.30319.
My nearly new PC is running CLR 4.0.30319.
C:\Program Files\Microsoft Visual Studio\2022\Enterprise>clrver
Microsoft (R) .NET CLR Version Tool Version 4.8.3928.0 Copyright (c) Microsoft Corporation. All rights reserved.
Versions installed on the machine: v4.0.30319
It looks as if that version of the CLR has been around for a decade :-/
Clearly, I am missing something. These vulnerabilities must have been fixed by now. How can you establish that when the CLR version they are reported against hasn't changed?