First published: Fri Sep 11 2020(Updated: )
<p>A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.</p> <p>Exploitation of this vulnerability requires that a user uploads a specially crafted SharePoint application package to an affected version of SharePoint.</p> <p>The security update addresses the vulnerability by correcting how SharePoint checks the source markup of application packages.</p>
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
=2013-sp1 | ||
=2016 | ||
=2010-sp2 | ||
=2013-sp1 | ||
=2019 | ||
Microsoft SharePoint Enterprise Server | =2013-sp1 | |
Microsoft SharePoint Enterprise Server | =2016 | |
Microsoft SharePoint Foundation | =2010-sp2 | |
Microsoft SharePoint Foundation | =2013-sp1 | |
Microsoft SharePoint Server | =2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1452 is rated as critical due to its remote code execution capabilities.
To fix CVE-2020-1452, apply the latest security updates provided by Microsoft for the affected SharePoint versions.
CVE-2020-1452 affects Microsoft SharePoint Foundation 2010, 2013, SharePoint Server 2016, and 2019.
CVE-2020-1452 is a remote code execution vulnerability that allows attackers to execute arbitrary code.
Yes, successful exploitation of CVE-2020-1452 can lead to unauthorized access and potential data breaches.