PT-2020-3077 · Microsoft +3 · .Net Framework +5

Published

2020-07-14

·

Updated

2025-07-25

·

CVE-2020-1147

CVSS v2.0
10
VectorAV:N/AC:L/Au:N/C:C/I:C/A:C

**Name of the Vulnerable Software and Affected Versions:**

.NET Core versions prior to 3.1.6

.NET Core SDK versions prior to 3.1.106

.NET Core Runtime versions prior to 2.1.20

.NET Core SDK versions prior to 2.1.516

Microsoft .NET Framework

Microsoft SharePoint

Microsoft Visual Studio

**Description:**

A remote code execution vulnerability exists due to improper handling of XML file input. An attacker could exploit this flaw by uploading a specially crafted XML document to a server running an affected product, potentially executing arbitrary code in the context of the process responsible for XML deserialization. This vulnerability stems from a failure to properly validate the source markup of XML files. Exploitation of this vulnerability has been observed in active attacks targeting on-premises Microsoft SharePoint servers, originating from an incomplete fix for a previous vulnerability. The vulnerability affects systems utilizing `dataset` and `datatable` types.

**Recommendations:**

Update .NET Core Runtime to version 3.1.6 or later.

Update .NET Core SDK to version 3.1.106 or later.

Update .NET Core Runtime to version 2.1.20 or later.

Update .NET Core SDK to version 2.1.516 or later.

At the moment, there is no information about a newer version that contains a fix for this vulnerability. for Microsoft .NET Framework, Microsoft SharePoint, and Microsoft Visual Studio.

Exploit

Weakness Enumeration

Related Identifiers

ALT-PU-2020-2513
ALT-PU-2020-2514
ALT-PU-2020-2592
ALT-PU-2020-2593
BDU:2020-03369
CESA-2020_2938
CESA-2020_2954
CVE-2020-1147
GHSA-G5VF-38CP-4PX9
RHSA-2020:2937
RHSA-2020:2938
RHSA-2020:2939
RHSA-2020:2954
RHSA-2020:2988
RHSA-2020:2989
RHSA-2020_2938
RHSA-2020_2954

Affected Products

.Net Framework
Alt Linux
Centos
Sharepoint Server
Red Hat
Visual Studio