First published: Fri Sep 11 2020(Updated: )
<p>A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.</p> <p>Exploitation of this vulnerability requires that a user uploads a specially crafted SharePoint application package to an affected version of SharePoint.</p> <p>The security update addresses the vulnerability by correcting how SharePoint checks the source markup of application packages.</p>
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
=2013-sp1 | ||
=2016 | ||
=2010-sp2 | ||
=2013-sp1 | ||
=2010-sp2 | ||
=2019 | ||
Microsoft SharePoint Enterprise Server | =2013-sp1 | |
Microsoft SharePoint Enterprise Server | =2016 | |
Microsoft SharePoint Foundation | =2010-sp2 | |
Microsoft SharePoint Foundation | =2013-sp1 | |
Microsoft SharePoint Server | =2010-sp2 | |
Microsoft SharePoint Server | =2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1576 has a critical severity rating as it allows remote code execution on affected SharePoint systems.
To fix CVE-2020-1576, you should apply the latest security updates provided by Microsoft for the affected SharePoint versions.
CVE-2020-1576 affects Microsoft SharePoint Foundation 2010 SP2, SharePoint Foundation 2013 SP1, SharePoint Server 2010 SP2, SharePoint Server 2016, and SharePoint Server 2019.
CVE-2020-1576 is categorized as a remote code execution vulnerability.
No, CVE-2020-1576 requires remote access to exploit the vulnerability.