支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: 55964a28c0582ba7d7bb28591e03ca2e52867451

来源
关联漏洞
标题:Microsoft SQL Server Reporting Services 跨站脚本漏洞 (CVE-2019-1332)
Description:Microsoft SQL Server Reporting Services(SSRS)是美国微软(Microsoft)公司的一套基于服务器的报告平台,它支持创建、部署和管理移动和分页报表。 Microsoft SQL Server Reporting Services中存在跨站脚本漏洞,该漏洞源于程序没有正确清理特制的Web请求。远程攻击者可借助特制的链接利用该漏洞读取未授权的内容,执行恶意代码并使用用户身份执行操作。以下产品及版本受到影响:Microsoft Power BI Report Serv
Description
CVE-2019-1332: Reflected Cross-Site Scripting in Microsoft SQL Server Reporting Services
介绍
# CVE-2019-1332: Reflected Cross-Site Scripting in Microsoft SQL Server Reporting Services

A cross-site scripting (XSS) vulnerability exists when Microsoft SQL Server Reporting Services (SSRS) does not properly sanitize a specially-crafted web request to an affected SSRS server. An attacker who successfully exploited the vulnerability could run scripts in the context of the targeted user. The attacks could allow the attacker to read content that the attacker is not authorized to read, execute malicious code, and use the victim's identity to take actions on the site on behalf of the user, such as change permissions and delete content.

<strong>Note:</strong> To exploit the vulnerability, an attacker would need to convince an authenticated user to click a specially-crafted link to an affected SSRS server.

### Vendor Disclosure:

The vendor's disclosure and fix for this vulnerability can be found [here](https://msrc.microsoft.com/update-guide/en-us/advisory/CVE-2019-1332).

### Requirements:

This vulnerability requires:
<br/>
- Convincing an authenticated SSRS user to click on a specially-crafted link

### Proof Of Concept:

More details and the exploitation process can be found in this [PDF](https://github.com/mbadanoiu/CVE-2019-1332/blob/main/Microsoft%20SQL%20Server%20Reporting%20Services%20-%20CVE-2019-1332.pdf).
文件快照

[4.0K] /data/pocs/55964a28c0582ba7d7bb28591e03ca2e52867451 ├── [678K] Microsoft SQL Server Reporting Services - CVE-2019-1332.pdf └── [1.3K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。