diff --git a/cves/2020/CVE-2020-16952.yaml b/cves/2020/CVE-2020-16952.yaml index aaa6f90f78..34d2b400e2 100644 --- a/cves/2020/CVE-2020-16952.yaml +++ b/cves/2020/CVE-2020-16952.yaml @@ -4,15 +4,16 @@ info: name: Microsoft SharePoint Server-Side Include (SSI) and ViewState RCE author: dwisiswant0 severity: critical - reference: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16952 + description: A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-16951. + reference: + - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16952 + - https://srcincite.io/pocs/cve-2020-16952.py.txt + - https://github.com/rapid7/metasploit-framework/blob/1a341ae93191ac5f6d8a9603aebb6b3a1f65f107/documentation/modules/exploit/windows/http/sharepoint_ssi_viewstate.md tags: cve,cve2020,sharepoint,iis - # This template supports the detection part only. See references[2]. - # References: - # - [1] Patch: https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-16952 - # - [2] https://srcincite.io/pocs/cve-2020-16952.py.txt - # - [3] https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16952 - # - [4] https://github.com/rapid7/metasploit-framework/blob/1a341ae93191ac5f6d8a9603aebb6b3a1f65f107/documentation/modules/exploit/windows/http/sharepoint_ssi_viewstate.md + # This template supports the detection part only. See reference. + # Reference: + # - https://srcincite.io/pocs/cve-2020-16952.py.txt requests: - method: GET