CVE-2020-1573

5.5 MEDIUM

📋 TL;DR

This is a cross-site scripting (XSS) vulnerability in Microsoft SharePoint Server where authenticated attackers can inject malicious scripts through specially crafted web requests. Successful exploitation allows attackers to perform actions as the victim user, including reading unauthorized content, modifying permissions, deleting content, and injecting malicious content. Only authenticated users can exploit this vulnerability.

💻 Affected Systems

Products:
  • Microsoft SharePoint Server
Versions: Specific versions not specified in advisory, but typically affects multiple versions prior to security update
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Requires SharePoint Server installation with web access enabled. Only affects authenticated users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could gain administrative privileges, exfiltrate sensitive data, delete or modify all SharePoint content, and maintain persistent access through backdoors.

🟠

Likely Case

An authenticated user with limited privileges could escalate their access, steal session cookies, modify content they shouldn't have access to, and perform phishing attacks against other users.

🟢

If Mitigated

With proper input validation and output encoding, the risk is reduced to minimal, though authenticated users could still attempt exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access to SharePoint and knowledge of XSS payloads. No public exploit code was found at time of advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security update released August 2020

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1573

Restart Required: Yes

Instructions:

1. Download the security update from Microsoft Update Catalog. 2. Apply the update to all affected SharePoint servers. 3. Restart the SharePoint servers. 4. Test functionality after patching.

🔧 Temporary Workarounds

Input Validation Enhancement

windows

Implement additional input validation for SharePoint web requests

Content Security Policy

all

Implement strict Content Security Policy headers to limit script execution

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XSS payloads
  • Restrict authenticated user permissions to minimum required levels

🔍 How to Verify

Check if Vulnerable:

Check SharePoint version and compare against patched versions in Microsoft advisory

Check Version:

Get-SPFarm | Select BuildVersion

Verify Fix Applied:

Verify security update is installed via Windows Update history or SharePoint version check

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests with script tags or JavaScript payloads
  • Multiple failed authentication attempts followed by successful login and suspicious requests

Network Indicators:

  • HTTP requests containing script tags or JavaScript in parameters
  • Unusual outbound connections from SharePoint servers

SIEM Query:

source="sharepoint" AND (http_request="*<script*" OR http_request="*javascript:*" OR http_request="*onload=*" OR http_request="*onerror=*")

🔗 References

📤 Share & Export