First published: Fri Sep 11 2020(Updated: )
<p>A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.</p> <p>Exploitation of this vulnerability requires that a user uploads a specially crafted SharePoint application package to an affected version of SharePoint.</p> <p>The security update addresses the vulnerability by correcting how SharePoint checks the source markup of application packages.</p>
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft SharePoint Enterprise Server 2016 | =2016 | |
Microsoft SharePoint Foundation 2013 | =2010-sp2 | |
Microsoft SharePoint Foundation 2013 | =2013-sp1 | |
Microsoft SharePoint Server 2010 | =2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1200 is rated as critical because it allows remote code execution in Microsoft SharePoint.
The affected versions include Microsoft SharePoint Foundation 2010 SP2, SharePoint Foundation 2013 SP1, SharePoint Server 2019, and SharePoint Enterprise Server 2016.
To fix CVE-2020-1200, apply the latest security updates provided by Microsoft for the affected SharePoint versions.
CVE-2020-1200 is a remote code execution vulnerability that occurs when SharePoint fails to validate application package source markup.
If exploited, CVE-2020-1200 can allow an attacker to execute arbitrary code in the context of the SharePoint application pool.