CVE-2020-16969 – Microsoft Exchange Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2020-16969
<p>An information disclosure vulnerability exists in how Microsoft Exchange validates tokens when handling certain messages. An attacker who successfully exploited the vulnerability could use this to gain further information from a user.</p> <p>To exploit the vulnerability, an attacker could include specially crafted OWA messages that could be loaded, without warning or filtering, from the attacker-controlled URL. This callback vector provides an information disclosure tactic used in web beacons and other types of tracking systems.</p> <p>The security update corrects the way that Exchange handles these token validations. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16969 •
CVE-2020-16875 – Microsoft Exchange Server Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-16875
<p>A remote code execution vulnerability exists in Microsoft Exchange server due to improper validation of cmdlet arguments.</p> <p>An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the System user. Exploitation of the vulnerability requires an authenticated user in a certain Exchange role to be compromised.</p> <p>The security update addresses the vulnerability by correcting how Microsoft Exchange handles cmdlet arguments.</p> Se presenta una vulnerabilidad de ejecución de código remota en el servidor de Microsoft Exchange debido a una comprobación inapropiada de los argumentos cmdlet. • http://packetstormsecurity.com/files/159210/Microsoft-Exchange-Server-DlpUtils-AddTenantDlpPolicy-Remote-Code-Execution.html https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16875 https://support.microsoft.com/en-us/help/4577352/security-update-for-exchange-server-2019-and-2016 https://srcincite.io/advisories/src-2020-0019 https://srcincite.io/pocs/cve-2020-16875.py.txt https://srcincite.io/pocs/cve-2020-16875.ps1.txt https://srcincite.io/blog/2021/01/12/making-clouds- • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-269: Improper Privilege Management •
CVE-2020-0903
https://notcve.org/view.php?id=CVE-2020-0903
A cross-site-scripting (XSS) vulnerability exists when Microsoft Exchange Server does not properly sanitize a specially crafted web request to an affected Exchange server, aka 'Microsoft Exchange Server Spoofing Vulnerability'. Existe una vulnerabilidad de tipo cross-site-scripting (XSS) cuando Microsoft Exchange Server no sanea apropiadamente una petición web especialmente diseñada para un servidor de Exchange afectado, también se conoce como "Microsoft Exchange Server Spoofing Vulnerability". • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0903 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2020-0692
https://notcve.org/view.php?id=CVE-2020-0692
An elevation of privilege vulnerability exists in Microsoft Exchange Server, aka 'Microsoft Exchange Server Elevation of Privilege Vulnerability'. Se presenta una vulnerabilidad de elevación de privilegios en Microsoft Exchange Server, también se conoce como "Microsoft Exchange Server Elevation of Privilege Vulnerability". • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0692 •
CVE-2020-0688 – Microsoft Exchange Server Validation Key Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-0688
A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Memory Corruption Vulnerability'. Se presenta una vulnerabilidad de ejecución de código remota en el software Microsoft Exchange cuando el software no puede manejar apropiadamente los objetos en la memoria, también se conoce como "Microsoft Exchange Memory Corruption Vulnerability". This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Exchange Server. Authentication is required to exploit this vulnerability. The specific flaw exists within the Exchange Control Panel web application. The product fails to generate a unique cryptographic key at installation, which can result in deserialization of untrusted data. • https://www.exploit-db.com/exploits/48168 https://www.exploit-db.com/exploits/48153 https://github.com/zcgonvh/CVE-2020-0688 https://github.com/Jumbo-WJB/CVE-2020-0688 https://github.com/onSec-fr/CVE-2020-0688-Scanner https://github.com/ravinacademy/CVE-2020-0688 https://github.com/MrTiz/CVE-2020-0688 https://github.com/youncyb/CVE-2020-0688 https://github.com/W01fh4cker/CVE-2020-0688-GUI https://github.com/righter83/CVE-2020-0688 https://github.com/ktpdpro • CWE-287: Improper Authentication •