Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2020-16969

Опубликовано: 13 окт. 2020
Источник: msrc
CVSS3: 7.1
EPSS Низкий

Описание

Microsoft Exchange Information Disclosure Vulnerability

An information disclosure vulnerability exists in how Microsoft Exchange validates tokens when handling certain messages. An attacker who successfully exploited the vulnerability could use this to gain further information from a user.

To exploit the vulnerability, an attacker could include specially crafted OWA messages that could be loaded, without warning or filtering, from the attacker-controlled URL. This callback vector provides an information disclosure tactic used in web beacons and other types of tracking systems.

The security update corrects the way that Exchange handles these token validations.

FAQ

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is data inside the targeted website like IDs, tokens, nonces, and other sensitive information.

Обновления

ПродуктСтатьяОбновление
Microsoft Exchange Server 2013 Cumulative Update 23
Microsoft Exchange Server 2019 Cumulative Update 6
Microsoft Exchange Server 2016 Cumulative Update 17
Microsoft Exchange Server 2019 Cumulative Update 7
Microsoft Exchange Server 2016 Cumulative Update 18

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

Older Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 75%
0.00878
Низкий

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 7.1
nvd
больше 5 лет назад

<p>An information disclosure vulnerability exists in how Microsoft Exchange validates tokens when handling certain messages. An attacker who successfully exploited the vulnerability could use this to gain further information from a user.</p> <p>To exploit the vulnerability, an attacker could include specially crafted OWA messages that could be loaded, without warning or filtering, from the attacker-controlled URL. This callback vector provides an information disclosure tactic used in web beacons and other types of tracking systems.</p> <p>The security update corrects the way that Exchange handles these token validations.</p>

CVSS3: 7.1
github
больше 3 лет назад

An information disclosure vulnerability exists in how Microsoft Exchange validates tokens when handling certain messages, aka 'Microsoft Exchange Information Disclosure Vulnerability'.

CVSS3: 5.3
fstec
больше 5 лет назад

Уязвимость почтового сервера Microsoft Exchange Server, связанная с недостаточной проверки входных данных при анализе токенов, позволяюшая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 6.5
fstec
больше 5 лет назад

Уязвимость почтового сервера Microsoft Exchange Server, связанная с ошибками при обработке сообщений, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 7.8
msrc
почти 5 лет назад

Microsoft Exchange Server Remote Code Execution Vulnerability

EPSS

Процентиль: 75%
0.00878
Низкий

7.1 High

CVSS3