Remote code execution in Microsoft SQL Server Reporting Services



Published: 2020-02-11 | Updated: 2020-03-13
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2020-0618
CWE-ID CWE-20
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
Microsoft SQL Server
Server applications / Database software

Vendor Microsoft

Security Bulletin

This security bulletin contains information about 1 vulnerabilities.

Updated: 13.03.2020

Added link to exploit code, updated CVSS metrics.

1) Input validation error

EUVDB-ID: #VU25231

Risk: Medium

CVSSv3.1: 7 [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C]

CVE-ID: CVE-2020-0618

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to insufficient validation of page requests. A remote authenticated attacker can submit a specially crafted page request to the affected Reporting Services instance and execute arbitrary code on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Microsoft SQL Server: 2012 - 2016


CPE2.3 External links

http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0618
http://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/windows/http/ssrs_navcorrector_viewstate.rb

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.



###SIDEBAR###