PT-2020-3077 · Microsoft +3 · Visual Studio +5
Published
2020-07-14
·
Updated
2025-08-25
·
CVE-2020-1147
10
High
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
**Name of the Vulnerable Software and Affected Versions:**
.NET Core versions prior to 3.1.106
.NET Core Runtime versions prior to 2.1.20
.NET Core SDK versions prior to 2.1.516
Microsoft .NET Framework (affected versions not specified)
Microsoft SharePoint Server (affected versions not specified)
Microsoft SharePoint Enterprise Server (affected versions not specified)
Microsoft Visual Studio (affected versions not specified)
MS Lync/Skype for Business (affected versions not specified)
**Description:**
A remote code execution vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio when the software fails to check the source markup of XML file input. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the process responsible for deserialization of the XML content. The vulnerability stems from an incomplete fix for a flaw initially reported in 2020 and has been actively exploited in recent ToolShell attacks targeting on-premises Microsoft SharePoint servers. The vulnerability is related to the processing of XML data and can be triggered by uploading a specially crafted document. The issue affects .NET dataset and datatable types.
**Recommendations:**
Update .NET Core to version 3.1.106 or later.
Update .NET Core Runtime to version 2.1.20 or later.
Update .NET Core SDK to version 2.1.516 or later.
At the moment, there is no information about a newer version that contains a fix for this vulnerability for Microsoft .NET Framework, Microsoft SharePoint Server, Microsoft SharePoint Enterprise Server, MS Lync/Skype for Business and Microsoft Visual Studio.
Exploit
Fix
Weakness Enumeration
Related Identifiers
Affected Products
References · 51
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/sharepoint_data_deserialization.rb⭐ 35285 🔗 14255 · Exploit
- 🔥 https://exploit-db.com/exploits/50151 · Exploit
- 🔥 https://exploitalert.com/view-details.html?id=35992 · Exploit
- 🔥 https://exploit-db.com/exploits/48747 · Exploit
- 🔥 http://packetstormsecurity.com/files/158694/SharePoint-DataSet-DataTable-Deserialization.html · Exploit
- 🔥 http://packetstormsecurity.com/files/158876/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html · Exploit
- 🔥 http://packetstormsecurity.com/files/163644/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html · Exploit
- https://linux.oracle.com/errata/ELSA-2020-2938.html · Vendor Advisory
- https://errata.altlinux.org/ALT-PU-2020-2593 · Vendor Advisory
- https://bdu.fstec.ru/vul/2020-03369 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1147 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1108 · Security Note
- https://errata.altlinux.org/ALT-PU-2020-2514 · Vendor Advisory
- https://errata.altlinux.org/ALT-PU-2020-2513 · Vendor Advisory
- https://errata.altlinux.org/ALT-PU-2020-2592 · Vendor Advisory