Vulnerability Description
A Remote Code Execution vulnerability in Stimulsoft (aka Stimulsoft Reports) 2013.1.1600.0 allows an attacker to encode C# scripts as base-64 in the report XML file so that they will be compiled and executed on the server that processes this file. This can be used to fully compromise the server.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Stimulsoft | Reports | 2013.1.1600.0 |
Related Weaknesses (CWE)
References
- http://burninatorsec.blogspot.com/2018/11/reporting-c-serialization-remote-code.ExploitThird Party Advisory
- http://burninatorsec.blogspot.com/2018/11/reporting-c-serialization-remote-code.ExploitThird Party Advisory
FAQ
What is CVE-2020-15865?
CVE-2020-15865 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A Remote Code Execution vulnerability in Stimulsoft (aka Stimulsoft Reports) 2013.1.1600.0 allows an attacker to encode C# scripts as base-64 in the report XML file so that they will be compiled and e...
How severe is CVE-2020-15865?
CVE-2020-15865 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-15865?
Check the references section above for vendor advisories and patch information. Affected products include: Stimulsoft Reports.