Sunday, January 24, 12:21
Home security Critical security vulnerability affects Microsoft SharePoint

Critical security vulnerability affects Microsoft SharePoint

Details are now available to exploit a critical security vulnerability that affects Microsoft SharePoint, increasing the risk of attacks on unpatched systems.

A technical post released this week explains how the error works and how a user with low privileges can use it to execute him arbitrary code remotely on a SharePoint server that will be the target.

Microsoft SharePoint

The defect received the tracking number CVE-2020-1147 (severity 9,8 out of 10) and also affects the .NET Framework and Visual Studio. Microsoft has released a correction in the release of security updates this month.

Security researcher Steven Seeley provides a comprehensive analysis of the root causes of the problem and how it can be used to achieve remote code execution on a vulnerable SharePoint server.

In essence, the error is the failure to control the source signal of the XML input file, allowing an attacker to execute its code choice as part of the process responsible for degrading XML content.

On his website, Seeley follows all the steps required to create the code that allows you to execute a command. systemic (system command) and the abuse of controls that allow it to do so remotely.

Seeley's analysis aims to help "understand the underlying technology." It can be used to create a fully functional attack scenario, but it does not provide one exploit which can be used to develop a attack.

However, organizations must give priority to the implementation of the patch. Microsoft's exploitability assessment is that CVE-2020-1147 is an attractive target for threatening factors, who could use it consistently.

"Microsoft rates this bug with an exploitability score of 1, which means you need to fix it right away if you haven't already. It is very likely that this "gadget chain" can be used by many applications created with .net and even if you have not installed SharePoint server, you are still affected by this error. ” says Steven Seeley.

Ben Hawkes, head of Google's Project Zero security research team, says the issue is bigger than the leaked Windows DNS vulnerability.

Microsoft says the CVE-2020-1147 vulnerability was identified by Oleksandr Mirosh of Micro Focus Fortify, Jonathan Birch of the Microsoft Office Security Team and Markus Wulftange. They found and reported the vulnerability independently.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Teo Ehc
Teo Ehchttps://www.secnews.gr
Be the limited edition.

LIVE NEWS

Signal: How to check if your messages are private and secure?

The Signal messaging application has suddenly gained a large number of new users, which is due to the recent "scandal" of WhatsApp, which announced ...

Instagram: How to enable notifications for specific profiles

There are some profiles on Instagram where you want to see the content they publish as soon as possible - it can be a news ...
00:01:55

NASA's historic launch pad is to be demolished

NASA's famous Mobile Launcher Platform-2 launch platform, which has been linked to the Apollo and Space Shuttle missions, ...
00:02:12

Elon Musk: Gives $ 100 million for best CO2 capture technology

https://www.youtube.com/watch?v=Y0iUZc30vj4 Ο Elon Musk δήλωσε χθες, στο λογαριασμό του στο Twitter, ότι σκοπεύει να δώσει 100 εκατομμύρια...

How can you unblock sites and services using a VPN?

The Internet is free and open to all. However, there are some sites and services whose content is blocked, which ...

Google Chrome: How to manage your extensions?

Google Chrome extensions can be very useful, as they improve your productivity when using the browser.

Intel CPUs Review: Core i7-10700 vs Core i7-10700K!

Over the years, the Intel series of processors (CPUs) introduced the series of overclocking models "K" and more recently the series ...

The DeLorean can return as an electric car

The DMC DeLorean has been out of production for almost 40 years, but it looks like the iconic vehicle will return as an electric car.

Windows RDP servers are used to support DDoS

Cybercrime gangs are abusing Windows Remote Desktop Protocol (RDP) systems to reinforce the unwanted ...

SEPA: He refused to pay a ransom and thousands of files were leaked

Thousands of stolen files of the Scottish Environmental Protection Agency (SEPA) have been published by hackers, after the organization refused to pay the ransom ...