Add references, and put a description
parent
83b5dd9515
commit
3bd6dd3a88
|
@ -4,15 +4,16 @@ info:
|
||||||
name: Microsoft SharePoint Server-Side Include (SSI) and ViewState RCE
|
name: Microsoft SharePoint Server-Side Include (SSI) and ViewState RCE
|
||||||
author: dwisiswant0
|
author: dwisiswant0
|
||||||
severity: critical
|
severity: critical
|
||||||
reference: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16952
|
description: A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-16951.
|
||||||
|
reference:
|
||||||
|
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16952
|
||||||
|
- https://srcincite.io/pocs/cve-2020-16952.py.txt
|
||||||
|
- https://github.com/rapid7/metasploit-framework/blob/1a341ae93191ac5f6d8a9603aebb6b3a1f65f107/documentation/modules/exploit/windows/http/sharepoint_ssi_viewstate.md
|
||||||
tags: cve,cve2020,sharepoint,iis
|
tags: cve,cve2020,sharepoint,iis
|
||||||
|
|
||||||
# This template supports the detection part only. See references[2].
|
# This template supports the detection part only. See reference.
|
||||||
# References:
|
# Reference:
|
||||||
# - [1] Patch: https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-16952
|
# - https://srcincite.io/pocs/cve-2020-16952.py.txt
|
||||||
# - [2] https://srcincite.io/pocs/cve-2020-16952.py.txt
|
|
||||||
# - [3] https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16952
|
|
||||||
# - [4] https://github.com/rapid7/metasploit-framework/blob/1a341ae93191ac5f6d8a9603aebb6b3a1f65f107/documentation/modules/exploit/windows/http/sharepoint_ssi_viewstate.md
|
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
Loading…
Reference in New Issue