PT-2020-3077 · Microsoft +3 · .Net Framework +5
Published
2020-07-14
·
Updated
2025-07-25
·
CVE-2020-1147
10
High
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
**Name of the Vulnerable Software and Affected Versions:**
.NET Core versions prior to 3.1.6
.NET Core SDK versions prior to 3.1.106
.NET Core Runtime versions prior to 2.1.20
.NET Core SDK versions prior to 2.1.516
Microsoft .NET Framework
Microsoft SharePoint
Microsoft Visual Studio
**Description:**
A remote code execution vulnerability exists due to improper handling of XML file input. An attacker could exploit this flaw by uploading a specially crafted XML document to a server running an affected product, potentially executing arbitrary code in the context of the process responsible for XML deserialization. This vulnerability stems from a failure to properly validate the source markup of XML files. Exploitation of this vulnerability has been observed in active attacks targeting on-premises Microsoft SharePoint servers, originating from an incomplete fix for a previous vulnerability. The vulnerability affects systems utilizing `dataset` and `datatable` types.
**Recommendations:**
Update .NET Core Runtime to version 3.1.6 or later.
Update .NET Core SDK to version 3.1.106 or later.
Update .NET Core Runtime to version 2.1.20 or later.
Update .NET Core SDK to version 2.1.516 or later.
At the moment, there is no information about a newer version that contains a fix for this vulnerability. for Microsoft .NET Framework, Microsoft SharePoint, and Microsoft Visual Studio.
Exploit
Weakness Enumeration
Related Identifiers
Affected Products
References · 40
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/sharepoint_data_deserialization.rb⭐ 35285 🔗 14255 · Exploit
- 🔥 https://exploit-db.com/exploits/48747 · Exploit
- 🔥 http://packetstormsecurity.com/files/163644/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html · Exploit
- 🔥 https://exploit-db.com/exploits/50151 · Exploit
- 🔥 http://packetstormsecurity.com/files/158694/SharePoint-DataSet-DataTable-Deserialization.html · Exploit
- 🔥 https://exploitalert.com/view-details.html?id=35992 · Exploit
- 🔥 http://packetstormsecurity.com/files/158876/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html · Exploit
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1108 · Security Note
- https://osv.dev/vulnerability/CVE-2020-1147 · Vendor Advisory
- https://cve.org/CVERecord?id=CVE-2020-1147 · Security Note
- https://errata.altlinux.org/ALT-PU-2020-2592 · Vendor Advisory
- https://errata.altlinux.org/ALT-PU-2020-2514 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2020-1147 · Security Note
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1147 · Vendor Advisory
- https://errata.altlinux.org/ALT-PU-2020-2593 · Vendor Advisory