module

SharePoint DataSet / DataTable Deserialization

Disclosed
2020-07-14
Created
2020-07-30

Description

A remotely exploitable vulnerability exists within SharePoint that can be leveraged by a remote authenticated
attacker to execute code within the context of the SharePoint application service. The privileges in this
execution context are determined by the account that is specified when SharePoint is installed and configured.
The vulnerability is related to a failure to validate the source of XML input data, leading to an unsafe
deserialization operation that can be triggered from a page that initializes either the
ContactLinksSuggestionsMicroView type or a derivative of it. In a default configuration, a Domain User account
is sufficient to access SharePoint and exploit this vulnerability.

Authors

Steven Seeley
Soroush Dalili
Spencer McIntyre

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/windows/http/sharepoint_data_deserialization
msf exploit(sharepoint_data_deserialization) > show targets
...targets...
msf exploit(sharepoint_data_deserialization) > set TARGET < target-id >
msf exploit(sharepoint_data_deserialization) > show options
...show and set options...
msf exploit(sharepoint_data_deserialization) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.