CVE-2020-1200

8.6 HIGH

📋 TL;DR

This is a remote code execution vulnerability in Microsoft SharePoint that allows attackers to run arbitrary code by uploading a specially crafted application package. It affects SharePoint servers where users can upload packages, potentially compromising the entire SharePoint farm.

💻 Affected Systems

Products:
  • Microsoft SharePoint Server
  • Microsoft SharePoint Foundation
Versions: 2010, 2013, 2016, 2019
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Requires SharePoint application package upload capability to be enabled and accessible to users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of SharePoint farm, data exfiltration, lateral movement to other systems, and persistent backdoor installation.

🟠

Likely Case

Unauthorized access to SharePoint data, privilege escalation within SharePoint environment, and potential server compromise.

🟢

If Mitigated

Limited to authenticated user access only, with proper upload restrictions and monitoring in place.

🌐 Internet-Facing: HIGH - If SharePoint is internet-facing and allows package uploads, exploitation is straightforward.
🏢 Internal Only: MEDIUM - Requires internal user access but could lead to significant internal compromise.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user access to upload malicious packages. Public exploit code exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security updates for SharePoint 2010-2019 released in May 2020

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1200

Restart Required: Yes

Instructions:

1. Download appropriate security update from Microsoft Update Catalog. 2. Apply update to all SharePoint servers in farm. 3. Run SharePoint configuration wizard. 4. Restart servers as required.

🔧 Temporary Workarounds

Disable SharePoint application package uploads

windows

Restrict or disable the ability to upload SharePoint application packages (.app files)

Use SharePoint Central Administration or PowerShell to modify upload permissions

Implement strict upload validation

windows

Add additional validation layers for all uploaded SharePoint packages

Implement custom validation in SharePoint solution gallery settings

🧯 If You Can't Patch

  • Implement strict access controls on SharePoint upload functionality
  • Deploy network segmentation and monitor for suspicious upload activities

🔍 How to Verify

Check if Vulnerable:

Check SharePoint version and compare against patched versions. Verify if application package upload functionality is enabled.

Check Version:

Get-SPFarm | Select BuildVersion

Verify Fix Applied:

Verify SharePoint build number matches patched version from Microsoft advisory. Test upload functionality with safe packages.

📡 Detection & Monitoring

Log Indicators:

  • Unusual .app file uploads
  • Failed package validation attempts
  • Suspicious PowerShell execution from SharePoint processes

Network Indicators:

  • Unusual outbound connections from SharePoint servers
  • Large file uploads to SharePoint application galleries

SIEM Query:

source="sharepoint_logs" AND (file_extension=".app" OR process="powershell") AND user_action="upload"

🔗 References

📤 Share & Export