CVE-2020-16952
HIGH NUCLEIMicrosoft SharePoint Server-Side Include and ViewState RCE
Title source: metasploitDescription
<p>A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.</p> <p>Exploitation of this vulnerability requires that a user uploads a specially crafted SharePoint application package to an affected version of SharePoint.</p> <p>The security update addresses the vulnerability by correcting how SharePoint checks the source markup of application packages.</p>
Exploits (1)
metasploit
WORKING POC
EXCELLENT
by mr_me, wvu · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/sharepoint_ssi_viewstate.rb
Nuclei Templates (1)
Microsoft SharePoint - Remote Code Execution
HIGHby dwisiswant0
Scores
CVSS v3
8.6
EPSS
0.7508
EPSS Percentile
98.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
Details
CWE
CWE-346
Status
published
Products (3)
microsoft/sharepoint_enterprise_server
2016
microsoft/sharepoint_foundation
2013 sp1
microsoft/sharepoint_server
2019
Published
Oct 16, 2020
Tracked Since
Feb 18, 2026