Add references, and put a description

patch-1
Noam Rathaus 2021-03-11 17:06:39 +02:00
parent 83b5dd9515
commit 3bd6dd3a88
1 changed files with 8 additions and 7 deletions

View File

@ -4,15 +4,16 @@ info:
name: Microsoft SharePoint Server-Side Include (SSI) and ViewState RCE name: Microsoft SharePoint Server-Side Include (SSI) and ViewState RCE
author: dwisiswant0 author: dwisiswant0
severity: critical severity: critical
reference: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16952 description: A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-16951.
reference:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16952
- https://srcincite.io/pocs/cve-2020-16952.py.txt
- https://github.com/rapid7/metasploit-framework/blob/1a341ae93191ac5f6d8a9603aebb6b3a1f65f107/documentation/modules/exploit/windows/http/sharepoint_ssi_viewstate.md
tags: cve,cve2020,sharepoint,iis tags: cve,cve2020,sharepoint,iis
# This template supports the detection part only. See references[2]. # This template supports the detection part only. See reference.
# References: # Reference:
# - [1] Patch: https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-16952 # - https://srcincite.io/pocs/cve-2020-16952.py.txt
# - [2] https://srcincite.io/pocs/cve-2020-16952.py.txt
# - [3] https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16952
# - [4] https://github.com/rapid7/metasploit-framework/blob/1a341ae93191ac5f6d8a9603aebb6b3a1f65f107/documentation/modules/exploit/windows/http/sharepoint_ssi_viewstate.md
requests: requests:
- method: GET - method: GET