Rapid7 Vulnerability & Exploit Database

SharePoint DataSet / DataTable Deserialization

Back to Search

SharePoint DataSet / DataTable Deserialization

Disclosed
07/14/2020
Created
07/30/2020

Description

A remotely exploitable vulnerability exists within SharePoint that can be leveraged by a remote authenticated attacker to execute code within the context of the SharePoint application service. The privileges in this execution context are determined by the account that is specified when SharePoint is installed and configured. The vulnerability is related to a failure to validate the source of XML input data, leading to an unsafe deserialization operation that can be triggered from a page that initializes either the ContactLinksSuggestionsMicroView type or a derivative of it. In a default configuration, a Domain User account is sufficient to access SharePoint and exploit this vulnerability.

Author(s)

  • Steven Seeley
  • Soroush Dalili
  • Spencer McIntyre

Platform

Windows

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/http/sharepoint_data_deserialization
msf exploit(sharepoint_data_deserialization) > show targets
    ...targets...
msf exploit(sharepoint_data_deserialization) > set TARGET < target-id >
msf exploit(sharepoint_data_deserialization) > show options
    ...show and set options...
msf exploit(sharepoint_data_deserialization) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;