{"id":56156,"date":"2019-04-09T09:24:22","date_gmt":"2019-04-09T17:24:22","guid":{"rendered":"https:\/\/devblogs.microsoft.com\/devops\/?p=56156"},"modified":"2019-04-15T08:29:01","modified_gmt":"2019-04-15T16:29:01","slug":"april-security-release-patches-available-for-azure-devops-server-2019-tfs-2018-3-2-tfs-2018-1-2-tfs-2017-3-1-and-the-release-of-tfs-2015-4-2","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/devops\/april-security-release-patches-available-for-azure-devops-server-2019-tfs-2018-3-2-tfs-2018-1-2-tfs-2017-3-1-and-the-release-of-tfs-2015-4-2\/","title":{"rendered":"April Security Release: Patches available for Azure DevOps Server 2019, TFS 2018.3.2, TFS 2018.1.2, TFS 2017.3.1, and the release of TFS 2015.4.2"},"content":{"rendered":"<p>For the April security release, we are releasing fixes for vulnerabilities that impact Azure DevOps Server 2019, TFS 2018, TFS 2017, and TFS 2015. These vulnerabilities were found through our <a href=\"https:\/\/blogs.msdn.microsoft.com\/devops\/2019\/01\/17\/announcing-the-azure-devops-bug-bounty-program\/\">Azure DevOps Bounty Program<\/a>. Thanks to everyone who has been participating in this program.<\/p>\n<p><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0857\">CVE-2019-0857<\/a>: spoofing vulnerability in the Wiki<\/p>\n<p><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0866\">CVE-2019-0866<\/a>: remote code execution vulnerability in Pipelines<\/p>\n<p><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0867\">CVE-2019-0867<\/a>: cross site scripting (XSS) vulnerability in Pipelines<\/p>\n<p><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0868\">CVE-2019-0868<\/a>: cross site scripting (XSS) vulnerability in Pipelines<\/p>\n<p><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0869\">CVE-2019-0869<\/a>: HTML injection vulnerability in Pipelines<\/p>\n<p><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0870\">CVE-2019-0870<\/a>: cross site scripting (XSS) vulnerability in Pipelines<\/p>\n<p><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0871\">CVE-2019-0871<\/a>: cross site scripting (XSS) vulnerability in Pipelines<\/p>\n<p><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0874\">CVE-2019-0874<\/a>: cross site scripting (XSS) vulnerability in Pipelines<\/p>\n<p><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0875\">CVE-2019-0875<\/a>: elevation of privilege vulnerability in Boards<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/devblogs.microsoft.com\/devops\/wp-content\/uploads\/sites\/6\/2019\/04\/cve.png\" alt=\"\" width=\"981\" height=\"349\" class=\"alignnone size-full wp-image-56168\" srcset=\"https:\/\/devblogs.microsoft.com\/devops\/wp-content\/uploads\/sites\/6\/2019\/04\/cve.png 981w, https:\/\/devblogs.microsoft.com\/devops\/wp-content\/uploads\/sites\/6\/2019\/04\/cve-300x107.png 300w, https:\/\/devblogs.microsoft.com\/devops\/wp-content\/uploads\/sites\/6\/2019\/04\/cve-768x273.png 768w\" sizes=\"(max-width: 981px) 100vw, 981px\" \/><\/p>\n<h3>Azure DevOps Server 2019 Patch 1<\/h3>\n<p>If you have Azure DevOps Server 2019, you should install <a href=\"https:\/\/aka.ms\/azdev2019patch\">Azure DevOps Server 2019 Patch 1<\/a>.<\/p>\n<p><strong>Verifying Installation<\/strong><\/p>\n<p>To verify if you have this update installed, you can check the version of the following file: [INSTALL_DIR]\\Application Tier\\Web Services\\bin\\Microsoft.TeamFoundation.Server.WebAccess.VersionControl.dll. Azure DevOps Server 2019 is installed to c:\\Program Files\\Azure DevOps Server 2019 by default.<\/p>\n<p>After installing Azure DevOps Server 2019 Patch 1, the version will be 17.143.28804.3.<\/p>\n<h3>TFS 2018 Update 3.2 Patch 3<\/h3>\n<p>If you have TFS 2018 Update 2 or Update 3, you should first update to <a href=\"https:\/\/go.microsoft.com\/fwlink\/?LinkId=2008534\">TFS 2018 Update 3.2<\/a>. Once on Update 3.2, install <a href=\"https:\/\/aka.ms\/tfs2018.3.2patch\">TFS 2018 Update 3.2 Patch 3<\/a>.<\/p>\n<p><strong>Verifying Installation<\/strong><\/p>\n<p>To verify if you have this update installed, you can check the version of the following file: [TFS_INSTALL_DIR]\\Application Tier\\Web Services\\bin\\Microsoft.TeamFoundation.WorkItemTracking.Web.dll. TFS 2018 is installed to c:\\Program Files\\Microsoft Team Foundation Server 2018 by default.<\/p>\n<p>After installing TFS 2018 Update 3.2 Patch 3, the version will be 16.131.28728.4.<\/p>\n<h3>TFS 2018 Update 1.2 Patch 3<\/h3>\n<p>If you have TFS 2018 RTW or Update 1, you should first update to <a href=\"https:\/\/go.microsoft.com\/fwlink\/?LinkId=866620\">TFS 2018 Update 1.2<\/a>. Once on Update 1.2, install <a href=\"https:\/\/aka.ms\/tfs2018.1.2patch\">TFS 2018 Update 1.2 Patch 3<\/a>.<\/p>\n<p><strong>Verifying Installation<\/strong><\/p>\n<p>To verify if you have this update installed, you can check the version of the following file: [TFS_INSTALL_DIR]\\Application Tier\\Web Services\\bin\\Microsoft.TeamFoundation.Server.WebAccess.Admin.dll. TFS 2018 is installed to c:\\Program Files\\Microsoft Team Foundation Server 2018 by default.<\/p>\n<p>After installing TFS 2018 Update 1.2 Patch 3, the version will be 16.122.28801.2.<\/p>\n<h3>TFS 2017 Update 3.1 Patch 4<\/h3>\n<p>If you have TFS 2017, you should first update to <a href=\"https:\/\/go.microsoft.com\/fwlink\/?LinkId=857134\">TFS 2017 Update 3.1<\/a>. Once on Update 3.1, install <a href=\"https:\/\/aka.ms\/tfs2017.3.1patch\">TFS 2017 Update 3.1 Patch 4<\/a>.<\/p>\n<p><strong>Verifying Installation<\/strong><\/p>\n<p>To verify if you have a patch installed, you can check the version of the following file: [TFS_INSTALL_DIR]\\Application Tier\\Web Services\\bin\\Microsoft.TeamFoundation.Server.WebAccess.Admin.dll. TFS 2017 is installed to c:\\Program Files\\Microsoft Team Foundation Server 15.0 by default.<\/p>\n<p>After installing TFS 2017 Update 3.1 Patch 4, the version will be 15.117.28728.0.<\/p>\n<h3>TFS 2015 Update 4.2<\/h3>\n<p>If you are on TFS 2015, you should upgrade to TFS 2015 Update 4.2 with the <a href=\"https:\/\/go.microsoft.com\/fwlink\/?linkid=844069\">ISO<\/a> or <a href=\"https:\/\/go.microsoft.com\/fwlink\/?linkid=844068\">Web Install<\/a>. For TFS 2015 Update 4.2 Express, you can upgrade with the <a href=\"https:\/\/go.microsoft.com\/fwlink\/?linkid=844071\">ISO<\/a> or <a href=\"https:\/\/go.microsoft.com\/fwlink\/?linkid=844070\">Web Install<\/a>. This is a full upgrade and will require you to run the Upgrade Wizard.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For the April security release, we are releasing fixes for vulnerabilities that impact Azure DevOps Server 2019, TFS 2018, TFS 2017, and TFS 2015. These vulnerabilities were found through our Azure DevOps Bounty Program. Thanks to everyone who has been participating in this program. CVE-2019-0857: spoofing vulnerability in the Wiki CVE-2019-0866: remote code execution vulnerability [&hellip;]<\/p>\n","protected":false},"author":78,"featured_media":55982,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[224,253],"tags":[],"class_list":["post-56156","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-azure","category-azure-devops-server"],"acf":[],"blog_post_summary":"<p>For the April security release, we are releasing fixes for vulnerabilities that impact Azure DevOps Server 2019, TFS 2018, TFS 2017, and TFS 2015. These vulnerabilities were found through our Azure DevOps Bounty Program. Thanks to everyone who has been participating in this program. CVE-2019-0857: spoofing vulnerability in the Wiki CVE-2019-0866: remote code execution vulnerability [&hellip;]<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/posts\/56156","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/users\/78"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/comments?post=56156"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/posts\/56156\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/media\/55982"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/media?parent=56156"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/categories?post=56156"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/devops\/wp-json\/wp\/v2\/tags?post=56156"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}