2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2020-0618" ,
"sourceIdentifier" : "secure@microsoft.com" ,
"published" : "2020-02-11T22:15:13.400" ,
2024-11-23 13:10:58 +00:00
"lastModified" : "2024-11-21T04:53:52.117" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "A remote code execution vulnerability exists in Microsoft SQL Server Reporting Services when it incorrectly handles page requests, aka 'Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability'."
} ,
{
"lang" : "es" ,
"value" : "Se presenta una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remota en Microsoft SQL Server Reporting Services cuando maneja inapropiadamente las peticiones de p\u00e1gina, tambi\u00e9n se conoce como \"Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability\"."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
2024-11-23 13:10:58 +00:00
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.9
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:S/C:P/I:P/A:P" ,
2024-11-23 13:10:58 +00:00
"baseScore" : 6.5 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.0 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
2024-11-23 13:10:58 +00:00
"cisaExploitAdd" : "2024-09-18" ,
"cisaActionDue" : "2024-10-09" ,
"cisaRequiredAction" : "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable." ,
"cisaVulnerabilityName" : "Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability" ,
2023-04-24 12:24:31 +02:00
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-502"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:microsoft:sql_server:2012:sp4:*:*:*:*:*:*" ,
"matchCriteriaId" : "D7BD8F6C-FD88-483F-95E8-16F7A6BCFCC5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:microsoft:sql_server:2014:sp3:*:*:*:*:*:*" ,
"matchCriteriaId" : "03C65D96-44D0-4411-8B84-961973F1E4D0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:microsoft:sql_server:2016:sp2:*:*:*:*:x64:*" ,
"matchCriteriaId" : "CDCE78A8-26F9-4F9E-BDDD-E59DEA4A3791"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://packetstormsecurity.com/files/156707/SQL-Server-Reporting-Services-SSRS-ViewState-Deserialization.html" ,
"source" : "secure@microsoft.com" ,
"tags" : [
"Exploit" ,
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://packetstormsecurity.com/files/159216/Microsoft-SQL-Server-Reporting-Services-2016-Remote-Code-Execution.html" ,
"source" : "secure@microsoft.com" ,
"tags" : [
"Exploit" ,
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0618" ,
"source" : "secure@microsoft.com" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2024-11-23 13:10:58 +00:00
} ,
{
"url" : "http://packetstormsecurity.com/files/156707/SQL-Server-Reporting-Services-SSRS-ViewState-Deserialization.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://packetstormsecurity.com/files/159216/Microsoft-SQL-Server-Reporting-Services-2016-Remote-Code-Execution.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0618" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}