Search for vulnerabilities
Vulnerability details: VCID-7rqf-k1ux-aaac
Vulnerability ID VCID-7rqf-k1ux-aaac
Aliases CVE-2020-1147
GHSA-g5vf-38cp-4px9
Summary A remote code execution vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio when the software fails to check the source markup of XML file input, aka '.NET Framework, SharePoint Server, and Visual Studio Remote Code Execution Vulnerability'.
Status Published
Exploitability 2.0
Weighted Severity 9.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3.1 7.8 http://packetstormsecurity.com/files/158694/SharePoint-DataSet-DataTable-Deserialization.html
generic_textual HIGH http://packetstormsecurity.com/files/158694/SharePoint-DataSet-DataTable-Deserialization.html
ssvc Attend http://packetstormsecurity.com/files/158694/SharePoint-DataSet-DataTable-Deserialization.html
cvssv3.1 7.8 http://packetstormsecurity.com/files/158876/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html
generic_textual HIGH http://packetstormsecurity.com/files/158876/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html
ssvc Attend http://packetstormsecurity.com/files/158876/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html
cvssv3.1 7.8 http://packetstormsecurity.com/files/163644/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html
generic_textual HIGH http://packetstormsecurity.com/files/163644/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html
ssvc Attend http://packetstormsecurity.com/files/163644/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html
rhas Critical https://access.redhat.com/errata/RHSA-2020:2937
rhas Critical https://access.redhat.com/errata/RHSA-2020:2938
rhas Critical https://access.redhat.com/errata/RHSA-2020:2939
rhas Critical https://access.redhat.com/errata/RHSA-2020:2954
rhas Critical https://access.redhat.com/errata/RHSA-2020:2988
rhas Critical https://access.redhat.com/errata/RHSA-2020:2989
cvssv3 8.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1147.json
epss 0.87986 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.89091 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.89091 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.89091 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.89993 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.90832 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.90832 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.90832 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.91129 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.91129 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.91129 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92100 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92695 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92695 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92695 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92695 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92695 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92695 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92695 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92695 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92713 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92713 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92714 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92714 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92714 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.9273 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.9273 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92741 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92846 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92846 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92846 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92846 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92846 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92846 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92846 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92846 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92846 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92863 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92863 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.92956 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.94638 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
epss 0.94638 https://api.first.org/data/v1/epss?cve=CVE-2020-1147
rhbs urgent https://bugzilla.redhat.com/show_bug.cgi?id=1856929
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-g5vf-38cp-4px9
cvssv3.1 7.8 https://github.com/dotnet/announcements/issues/159
generic_textual HIGH https://github.com/dotnet/announcements/issues/159
cvssv2 6.8 https://nvd.nist.gov/vuln/detail/CVE-2020-1147
cvssv3 7.8 https://nvd.nist.gov/vuln/detail/CVE-2020-1147
cvssv3.1 7.8 https://nvd.nist.gov/vuln/detail/CVE-2020-1147
cvssv3.1 7.8 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1147
generic_textual HIGH https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1147
ssvc Attend https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1147
cvssv3.1 7.8 https://www.exploitalert.com/view-details.html?id=35992
generic_textual HIGH https://www.exploitalert.com/view-details.html?id=35992
ssvc Attend https://www.exploitalert.com/view-details.html?id=35992
Reference id Reference type URL
http://packetstormsecurity.com/files/158694/SharePoint-DataSet-DataTable-Deserialization.html
http://packetstormsecurity.com/files/158876/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html
http://packetstormsecurity.com/files/163644/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1147.json
https://api.first.org/data/v1/epss?cve=CVE-2020-1147
https://github.com/dotnet/announcements/issues/159
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1147
https://www.exploitalert.com/view-details.html?id=35992
1856929 https://bugzilla.redhat.com/show_bug.cgi?id=1856929
cpe:2.3:a:microsoft:.net_core:2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_core:2.1:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_core:3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_core:3.1:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*
CVE-2020-1147 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/aspx/webapps/48747.py
CVE-2020-1147 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/aspx/webapps/50151.py
CVE-2020-1147 https://nvd.nist.gov/vuln/detail/CVE-2020-1147
GHSA-g5vf-38cp-4px9 https://github.com/advisories/GHSA-g5vf-38cp-4px9
RHSA-2020:2937 https://access.redhat.com/errata/RHSA-2020:2937
RHSA-2020:2938 https://access.redhat.com/errata/RHSA-2020:2938
RHSA-2020:2939 https://access.redhat.com/errata/RHSA-2020:2939
RHSA-2020:2954 https://access.redhat.com/errata/RHSA-2020:2954
RHSA-2020:2988 https://access.redhat.com/errata/RHSA-2020:2988
RHSA-2020:2989 https://access.redhat.com/errata/RHSA-2020:2989
Data source KEV
Date added Nov. 3, 2021
Description Microsoft .NET Framework, Microsoft SharePoint, and Visual Studio contain a remote code execution vulnerability when the software fails to check the source markup of XML file input. Successful exploitation allows an attacker to execute code in the context of the process responsible for deserialization of the XML content.
Required action Apply updates per vendor instructions.
Due date May 3, 2022
Note
https://nvd.nist.gov/vuln/detail/CVE-2020-1147
Ransomware campaign use Unknown
Data source Exploit-DB
Date added July 23, 2021
Description Microsoft SharePoint Server 2019 - Remote Code Execution (2)
Ransomware campaign use Unknown
Source publication date July 23, 2021
Exploit type webapps
Platform aspx
Source update date July 23, 2021
Data source Metasploit
Description A remotely exploitable vulnerability exists within SharePoint that can be leveraged by a remote authenticated attacker to execute code within the context of the SharePoint application service. The privileges in this execution context are determined by the account that is specified when SharePoint is installed and configured. The vulnerability is related to a failure to validate the source of XML input data, leading to an unsafe deserialization operation that can be triggered from a page that initializes either the ContactLinksSuggestionsMicroView type or a derivative of it. In a default configuration, a Domain User account is sufficient to access SharePoint and exploit this vulnerability.
Note
Stability:
  - crash-safe
SideEffects:
  - artifacts-on-disk
  - ioc-in-logs
Reliability:
  - repeatable-session
Ransomware campaign use Unknown
Source publication date July 14, 2020
Platform Windows
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/windows/http/sharepoint_data_deserialization.rb
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://packetstormsecurity.com/files/158694/SharePoint-DataSet-DataTable-Deserialization.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:25:47Z/ Found at http://packetstormsecurity.com/files/158694/SharePoint-DataSet-DataTable-Deserialization.html
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://packetstormsecurity.com/files/158876/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:25:47Z/ Found at http://packetstormsecurity.com/files/158876/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://packetstormsecurity.com/files/163644/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:25:47Z/ Found at http://packetstormsecurity.com/files/163644/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1147.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/dotnet/announcements/issues/159
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2020-1147
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2020-1147
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2020-1147
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1147
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:25:47Z/ Found at https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1147
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://www.exploitalert.com/view-details.html?id=35992
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:25:47Z/ Found at https://www.exploitalert.com/view-details.html?id=35992
Exploit Prediction Scoring System (EPSS)
Percentile 0.98773
EPSS Score 0.87986
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.