Vulnerability Name: | CVE-2020-16952 (CCN-189069) | ||||||||||||
Assigned: | 2020-10-13 | ||||||||||||
Published: | 2020-10-13 | ||||||||||||
Updated: | 2020-10-21 | ||||||||||||
Summary: | A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-16951. | ||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.2 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
8.2 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-346 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-16952 Source: MISC Type: Exploit, Third Party Advisory http://packetstormsecurity.com/files/159612/Microsoft-SharePoint-SSI-ViewState-Remote-Code-Execution.html Source: XF Type: UNKNOWN ms-sharepoint-cve202016952-code-exec(189069) Source: CCN Type: metasploit-framework GIT Repository metasploit-framework/sharepoint_ssi_viewstate.rb at master · rapid7/metasploit-framework · GitHub Source: CCN Type: Packet Storm Security [10-19-2020] Microsoft SharePoint SSI / ViewState Remote Code Execution Source: CCN Type: Microsoft Security TechCenter - October 2020 Microsoft SharePoint Remote Code Execution Vulnerability Source: MISC Type: Patch, Vendor Advisory https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16952 Source: CCN Type: Rapid7 Vulnerability and Exploit Database Microsoft SharePoint Server-Side Include and ViewState RCE | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |