First published: Fri Sep 11 2020(Updated: )
<p>A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.</p> <p>Exploitation of this vulnerability requires that a user uploads a specially crafted SharePoint application package to an affected version of SharePoint.</p> <p>The security update addresses the vulnerability by correcting how SharePoint checks the source markup of application packages.</p>
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft SharePoint Enterprise Server 2016 | =2013-sp1 | |
Microsoft SharePoint Enterprise Server 2016 | =2016 | |
Microsoft SharePoint Foundation 2013 | =2010-sp2 | |
Microsoft SharePoint Foundation 2013 | =2013-sp1 | |
Microsoft SharePoint Server 2010 | =2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1453 has a critical severity rating due to its potential for remote code execution.
To fix CVE-2020-1453, apply the latest security updates from Microsoft for all affected versions of SharePoint.
CVE-2020-1453 affects Microsoft SharePoint Foundation 2010 SP2, SharePoint Foundation 2013 SP1, SharePoint Enterprise Server 2013 SP1, SharePoint Enterprise Server 2016, and SharePoint Server 2019.
Yes, attackers can exploit CVE-2020-1453 remotely to execute arbitrary code within the context of the SharePoint application pool.
Exploiting CVE-2020-1453 could lead to unauthorized access, data leakage, or complete system compromise within the affected SharePoint environment.