#VU26829 Spoofing attack in Microsoft SharePoint Server


Published: 2020-06-03

Vulnerability identifier: #VU26829

Vulnerability risk: Medium

CVSSv3.1: 4.9 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2020-0976

CWE-ID: CWE-451

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
Microsoft SharePoint Server
Server applications / Application servers

Vendor: Microsoft

Description

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to the Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. A remote authenticated attacker can send a specially crafted request and spoof page content.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Microsoft SharePoint Server: 2016

Microsoft SharePoint Server: 2013


External links
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0976


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability