Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-16944— Microsoft SharePoint Reflective XSS Vulnerability

CVSS 8.7 · High EPSS 0.60% · P70
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-16944

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Microsoft SharePoint Reflective XSS Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
<p>This vulnerability is caused when SharePoint Server does not properly sanitize a specially crafted request to an affected SharePoint server.</p> <p>An authenticated attacker could exploit this vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited this vulnerability could then perform cross-site scripting attacks on affected systems and run script in the security context of the current user. These attacks could allow the attacker to read content that the attacker is not authorized to read, use the victim's identity to take actions on the SharePoint site on behalf of the victim, such as change permissions, delete content, steal sensitive information (such as browser cookies) and inject malicious content in the browser of the victim.</p> <p>For this vulnerability to be exploited, a user must click a specially crafted URL that takes the user to a targeted SharePoint Web App site.</p> <p>In an email attack scenario, an attacker could exploit the vulnerability by sending an email message containing the specially crafted URL to the user of the targeted SharePoint Web App site and convincing the user to click the specially crafted URL.</p> <p>In a web-based attack scenario, an attacker would have to host a website that contains a specially crafted URL to the targeted SharePoint Web App site that is used to attempt to exploit these vulnerabilities. In addition, compromised websites and websites that accept or host user-provided content could contain specially crafted content that could exploit the vulnerability. An attacker would have no way to force users to visit a specially crafted website. Instead, an attacker would have to convince them to visit the website, typically by getting them to click a link in an instant messenger or email message that takes them to the attacker's website, and then convince them to click the specially crafted URL.</p> <p>The security update addresses the vulnerability by helping to ensure that SharePoint Server properly sanitizes user web requests.</p>
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft SharePoint 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft SharePoint是美国微软(Microsoft)公司的一套企业业务协作平台。该平台用于对业务信息进行整合,并能够共享工作、与他人协同工作、组织项目和工作组、搜索人员和信息。 SharePoint Server 存在安全漏洞,该漏洞允许攻击者可能在受影响的系统上执行跨站点脚本攻击,并在当前用户的安全上下文中运行脚本。以下产品及版本受到影响: Microsoft SharePoint Enterprise Server 2016版本, Microsoft SharePoint Foun
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
MicrosoftMicrosoft SharePoint Enterprise Server 2016 16.0.0 ~ publication cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*
MicrosoftMicrosoft SharePoint Server 2019 16.0.0 ~ publication cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*
MicrosoftMicrosoft SharePoint Foundation 2013 Service Pack 1 15.0.0 ~ publication cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*

II. Public POCs for CVE-2020-16944

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-16944

登录查看更多情报信息。

Same Patch Batch · Microsoft · 2020-10-16 · 89 CVEs total

CVE-2020-10808.8 HIGHWindows Hyper-V Elevation of Privilege Vulnerability
CVE-2020-168988.8 HIGHWindows TCP/IP Remote Code Execution Vulnerability
CVE-2020-169118.8 HIGHGDI+ Remote Code Execution Vulnerability
CVE-2020-168918.8 HIGHWindows Hyper-V Remote Code Execution Vulnerability
CVE-2020-169468.7 HIGHMicrosoft Office SharePoint XSS Vulnerability
CVE-2020-169458.7 HIGHMicrosoft Office SharePoint XSS Vulnerability
CVE-2020-169528.6 HIGHMicrosoft SharePoint Remote Code Execution Vulnerability
CVE-2020-169518.6 HIGHMicrosoft SharePoint Remote Code Execution Vulnerability
CVE-2020-169327.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2020-169547.8 HIGHMicrosoft Office Remote Code Execution Vulnerability
CVE-2020-169397.8 HIGHGroup Policy Elevation of Privilege Vulnerability
CVE-2020-169367.8 HIGHWindows Backup Service Elevation of Privilege Vulnerability
CVE-2020-169357.8 HIGHWindows COM Server Elevation of Privilege Vulnerability
CVE-2020-169297.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2020-169287.8 HIGHMicrosoft Office Click-to-Run Elevation of Privilege Vulnerability
CVE-2020-169247.8 HIGHJet Database Engine Remote Code Execution Vulnerability
CVE-2020-169237.8 HIGHMicrosoft Graphics Components Remote Code Execution Vulnerability
CVE-2020-169307.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2020-169407.8 HIGHWindows - User Profile Service Elevation of Privilege Vulnerability
CVE-2020-169677.8 HIGHWindows Camera Codec Pack Remote Code Execution Vulnerability

Showing top 20 of 89 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2020-16944

No comments yet


Leave a comment