Security News > 2020 > July > PoC Released for Critical Vulnerability Exposing SharePoint Servers to Attacks

PoC Released for Critical Vulnerability Exposing SharePoint Servers to Attacks
2020-07-22 18:28

Tracked as CVE-2020-1147 and considered critical severity, the bug occurs when the software doesn't check the source markup of XML file input.

"The vulnerability is found in the DataSet and DataTable types which are.NET components used to manage data sets," the software giant revealed in an advisory published last week.

In addition to releasing patches for the vulnerability, Microsoft also published guidance related to it, explaining what the DataSet and DataTable types of legacy.

NET components represent and what restrictions are applied when loading them from XML. The company also explains that, by default, only specific types of objects may be present in the deserialized data, and that an exception is thrown when the incoming XML data contains object types not on the list, resulting in the deserialization operation failing.

In a blog post this week, security specialist Steven Seeley detailed the manner in which the vulnerability can be triggered and also published a proof-of-concept exploit aimed at SharePoint servers, encouraging users to install the available patches as soon as possible.


News URL

http://feedproxy.google.com/~r/Securityweek/~3/2m9RD8rV8So/poc-released-critical-vulnerability-exposing-sharepoint-servers-attacks

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2020-07-14 CVE-2020-1147 Unspecified vulnerability in Microsoft products
A remote code execution vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio when the software fails to check the source markup of XML file input, aka '.NET Framework, SharePoint Server, and Visual Studio Remote Code Execution Vulnerability'.
local
low complexity
microsoft
7.8