CVE-2020-16952

HIGH NUCLEI

Microsoft SharePoint Server-Side Include and ViewState RCE

Title source: metasploit

Description

<p>A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.</p> <p>Exploitation of this vulnerability requires that a user uploads a specially crafted SharePoint application package to an affected version of SharePoint.</p> <p>The security update addresses the vulnerability by correcting how SharePoint checks the source markup of application packages.</p>

Exploits (1)

metasploit WORKING POC EXCELLENT
by mr_me, wvu · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/sharepoint_ssi_viewstate.rb

Nuclei Templates (1)

Microsoft SharePoint - Remote Code Execution
HIGHby dwisiswant0

Scores

CVSS v3 8.6
EPSS 0.7508
EPSS Percentile 98.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L

Details

CWE
CWE-346
Status published
Products (3)
microsoft/sharepoint_enterprise_server 2016
microsoft/sharepoint_foundation 2013 sp1
microsoft/sharepoint_server 2019
Published Oct 16, 2020
Tracked Since Feb 18, 2026