CVE-2020-1460

8.6 HIGH

📋 TL;DR

CVE-2020-1460 is a remote code execution vulnerability in Microsoft SharePoint Server that allows authenticated attackers to execute arbitrary code by uploading specially crafted ASP.Net web controls. This affects organizations running vulnerable SharePoint Server versions, requiring attackers to have authenticated access to create malicious pages.

💻 Affected Systems

Products:
  • Microsoft SharePoint Server
  • Microsoft SharePoint Foundation
Versions: Specific versions as listed in Microsoft advisory (typically SharePoint 2010-2019 affected versions)
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with page creation permissions. All default SharePoint installations with vulnerable versions are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of SharePoint Server with attacker gaining SYSTEM-level privileges, data exfiltration, lateral movement to other systems, and persistent backdoor installation.

🟠

Likely Case

Attacker with authenticated access executes code in SharePoint application pool context, potentially accessing sensitive data, modifying content, or disrupting services.

🟢

If Mitigated

With proper authentication controls and network segmentation, impact limited to authenticated user's permissions and isolated to SharePoint environment.

🌐 Internet-Facing: HIGH if SharePoint is internet-facing and allows user content upload, as authenticated users could exploit from anywhere.
🏢 Internal Only: HIGH as authenticated internal users (including compromised accounts) can exploit to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated user with ability to create pages. Exploit involves crafting malicious ASP.Net controls within SharePoint pages.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security updates released in July 2020 patch cycle

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1460

Restart Required: Yes

Instructions:

1. Download appropriate security update from Microsoft Update Catalog. 2. Apply update to all SharePoint servers. 3. Restart SharePoint services. 4. Test functionality.

🔧 Temporary Workarounds

Restrict Page Creation Permissions

windows

Limit which users can create and edit pages in SharePoint to reduce attack surface

Implement Web Application Firewall Rules

all

Configure WAF to block suspicious ASP.Net control patterns in SharePoint requests

🧯 If You Can't Patch

  • Implement strict access controls: Only grant page creation permissions to trusted users with business need
  • Monitor for suspicious page creation/modification activity and implement file upload restrictions

🔍 How to Verify

Check if Vulnerable:

Check SharePoint version against Microsoft's affected versions list in security advisory

Check Version:

Get-SPFarm | Select BuildVersion (PowerShell) or check Central Administration > Upgrade and Migration > Check product and patch installation status

Verify Fix Applied:

Verify security update is installed via Windows Update history or SharePoint version check

📡 Detection & Monitoring

Log Indicators:

  • Unusual page creation events
  • ASP.Net control uploads
  • Security event logs showing code execution attempts

Network Indicators:

  • HTTP POST requests with crafted ASP.Net controls to SharePoint pages
  • Unusual outbound connections from SharePoint servers

SIEM Query:

source="sharepoint" AND (event="page_creation" OR event="file_upload") AND user NOT IN [trusted_users]

🔗 References

📤 Share & Export