Vulnerability identifier: #VU17622
Vulnerability risk: High
CVSSv4.0: 9.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:A/U:Amber]
CVE-ID: CVE-2019-0604
CWE-ID:
CWE-94
Exploitation vector: Network
Exploit availability: Yes
Vulnerable software:
Microsoft SharePoint Server
Server applications /
Application servers
Microsoft SharePoint Foundation
Server applications /
Application servers
Vendor: Microsoft
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation when processing source code markup of an application package. A remote attacker with ability to upload a malicious package to the SharePoint server can execute it on the system in the context of the SharePoint application pool and the SharePoint server farm account.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system but requires privileges to upload application packages.
Note: this vulnerability is being actively exploited in the wild since April 23.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Microsoft SharePoint Server: 2010 - 2019
Microsoft SharePoint Foundation: 2013
External links
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0604
https://www.ncsc.gov.sa/wps/portal/ncsc/home/Alerts/!ut/p/z1/lVLRboJAEPwaH8kud-cBj2elYKkxYgpyLwYR67V...
https://pastebin.com/bUFPhucz
https://otx.alienvault.com/pulse/5cd3f89df12b501c477a6fba
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.