• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Microsoft SharePoint Exploit Attempt - CVE-2019-0604

Risk Factors

This SharePoint vulnerability is one of the top routinely exploited vulnerabilities. An attacker must create custom exploit code and XML-serialized payload, which can be difficult to create. But a successful exploit can enable remote code execution (RCE), providing access to sensitive files and a pivot point to the internal network.

Kill Chain

Exploitation

Risk Score

71

Detection diagram
Next in Exploitation: Microsoft SharePoint Exploit Attempt - CVE-2021-31181

Attack Background

Developers can create custom applications built on the Microsoft ASP.NET framework for their Microsoft SharePoint deployments. A vulnerable Active Server Pages Extended (ASPX) web page generated by ASP.NET, Picker.aspx, has hidden form fields that allow for user-supplied input. SharePoint has an XML-deserialization vulnerability where SharePoint fails to check serialized data sent to those form fields. Serialized data can be converted into different file formats, such as XML or Java. An attacker creates an HTTP POST request with malicious form data and payloads and sends the request to the target ASPX page. A specific combination of the serialized data and form parameters results in RCE. The code runs with privileges associated with the SharePoint application pool and the SharePoint server farm account.

Mitigation Options

Install relevant patches for affected versions

MITRE ATT&CK ID

What else can RevealX do for you?