First published: Tue Jul 14 2020(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft SharePoint Server. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of controls in the Microsoft.PerformancePoint.Scorecards.Client module. Instantiating the ExcelDataSet control can trigger the deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the SharePoint web server process.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft SharePoint | ||
Microsoft SharePoint Enterprise Server | =2013-sp1 | |
Microsoft SharePoint Enterprise Server | =2016 | |
Microsoft SharePoint Foundation | =2013-sp1 | |
Microsoft SharePoint Server | =2010-sp2 | |
Microsoft SharePoint Server | =2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1439 is a vulnerability that allows remote attackers to execute arbitrary code on affected installations of Microsoft SharePoint Server.
Yes, authentication is required to exploit this vulnerability.
CVE-2020-1439 has a severity rating of 8.8 (high).
CVE-2020-1439 affects Microsoft SharePoint Enterprise Server 2013 SP1, SharePoint Enterprise Server 2016, SharePoint Foundation 2013 SP1, SharePoint Server 2010 SP2, and SharePoint Server 2019.
To fix CVE-2020-1439, apply the necessary security updates provided by Microsoft.