目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2020-16944— Microsoft SharePoint 跨站脚本漏洞

CVSS 8.7 · High EPSS 0.60% · P70
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2020-16944の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Microsoft SharePoint Reflective XSS Vulnerability
ソース: NVD (National Vulnerability Database)
脆弱性説明
<p>This vulnerability is caused when SharePoint Server does not properly sanitize a specially crafted request to an affected SharePoint server.</p> <p>An authenticated attacker could exploit this vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited this vulnerability could then perform cross-site scripting attacks on affected systems and run script in the security context of the current user. These attacks could allow the attacker to read content that the attacker is not authorized to read, use the victim's identity to take actions on the SharePoint site on behalf of the victim, such as change permissions, delete content, steal sensitive information (such as browser cookies) and inject malicious content in the browser of the victim.</p> <p>For this vulnerability to be exploited, a user must click a specially crafted URL that takes the user to a targeted SharePoint Web App site.</p> <p>In an email attack scenario, an attacker could exploit the vulnerability by sending an email message containing the specially crafted URL to the user of the targeted SharePoint Web App site and convincing the user to click the specially crafted URL.</p> <p>In a web-based attack scenario, an attacker would have to host a website that contains a specially crafted URL to the targeted SharePoint Web App site that is used to attempt to exploit these vulnerabilities. In addition, compromised websites and websites that accept or host user-provided content could contain specially crafted content that could exploit the vulnerability. An attacker would have no way to force users to visit a specially crafted website. Instead, an attacker would have to convince them to visit the website, typically by getting them to click a link in an instant messenger or email message that takes them to the attacker's website, and then convince them to click the specially crafted URL.</p> <p>The security update addresses the vulnerability by helping to ensure that SharePoint Server properly sanitizes user web requests.</p>
ソース: NVD (National Vulnerability Database)
CVSS情報
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Microsoft SharePoint 跨站脚本漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Microsoft SharePoint是美国微软(Microsoft)公司的一套企业业务协作平台。该平台用于对业务信息进行整合,并能够共享工作、与他人协同工作、组织项目和工作组、搜索人员和信息。 SharePoint Server 存在安全漏洞,该漏洞允许攻击者可能在受影响的系统上执行跨站点脚本攻击,并在当前用户的安全上下文中运行脚本。以下产品及版本受到影响: Microsoft SharePoint Enterprise Server 2016版本, Microsoft SharePoint Foun
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
MicrosoftMicrosoft SharePoint Enterprise Server 2016 16.0.0 ~ publication cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*
MicrosoftMicrosoft SharePoint Server 2019 16.0.0 ~ publication cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*
MicrosoftMicrosoft SharePoint Foundation 2013 Service Pack 1 15.0.0 ~ publication cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*

II. CVE-2020-16944の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2020-16944のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Microsoft · 2020-10-16 · 89 CVEs total

CVE-2020-10808.8 HIGHWindows Hyper-V Elevation of Privilege Vulnerability
CVE-2020-168988.8 HIGHWindows TCP/IP Remote Code Execution Vulnerability
CVE-2020-169118.8 HIGHGDI+ Remote Code Execution Vulnerability
CVE-2020-168918.8 HIGHWindows Hyper-V Remote Code Execution Vulnerability
CVE-2020-169468.7 HIGHMicrosoft Office SharePoint XSS Vulnerability
CVE-2020-169458.7 HIGHMicrosoft Office SharePoint XSS Vulnerability
CVE-2020-169528.6 HIGHMicrosoft SharePoint Remote Code Execution Vulnerability
CVE-2020-169518.6 HIGHMicrosoft SharePoint Remote Code Execution Vulnerability
CVE-2020-169327.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2020-169547.8 HIGHMicrosoft Office Remote Code Execution Vulnerability
CVE-2020-169397.8 HIGHGroup Policy Elevation of Privilege Vulnerability
CVE-2020-169367.8 HIGHWindows Backup Service Elevation of Privilege Vulnerability
CVE-2020-169357.8 HIGHWindows COM Server Elevation of Privilege Vulnerability
CVE-2020-169297.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2020-169287.8 HIGHMicrosoft Office Click-to-Run Elevation of Privilege Vulnerability
CVE-2020-169247.8 HIGHJet Database Engine Remote Code Execution Vulnerability
CVE-2020-169237.8 HIGHMicrosoft Graphics Components Remote Code Execution Vulnerability
CVE-2020-169307.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2020-169407.8 HIGHWindows - User Profile Service Elevation of Privilege Vulnerability
CVE-2020-169677.8 HIGHWindows Camera Codec Pack Remote Code Execution Vulnerability

Showing 20 of 89 CVEs. View all on vendor page →

IV. 関連脆弱性

V. CVE-2020-16944へのコメント

まだコメントはありません


コメントを残す