Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2020-0618 |
CWE-ID | CWE-20 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software Subscribe |
Microsoft SQL Server Server applications / Database software |
Vendor | Microsoft |
This security bulletin contains information about 1 vulnerabilities.
Updated: 13.03.2020
Added link to exploit code, updated CVSS metrics.
EUVDB-ID: #VU25231
Risk: Medium
CVSSv3.1: 7 [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C]
CVE-ID: CVE-2020-0618
CWE-ID:
CWE-20 - Improper Input Validation
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to insufficient validation of page requests. A remote authenticated attacker can submit a specially crafted page request to the affected Reporting Services instance and execute arbitrary code on the system.
Install updates from vendor's website.
Vulnerable software versionsMicrosoft SQL Server: 2012 - 2016
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0618
http://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/windows/http/ssrs_navcorrector_viewstate.rb
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.