Description Preview
Overview
CVE-2020-0646 is a remote code execution vulnerability in Microsoft .NET Framework that affects SharePoint Server. The vulnerability is classified as CWE-91 (XML Injection) and allows attackers to inject malicious XML content into XOML workflow files. When SharePoint processes these files, the improper input validation in the .NET Framework can lead to remote code execution.
The vulnerability specifically affects the way SharePoint workflows handle XOML (Extensible Object Markup Language) files. An authenticated attacker with permissions to create or modify workflows could exploit this vulnerability to execute arbitrary code in the context of the SharePoint application pool or server process.
The exploitation of this vulnerability could allow attackers to install programs, view, change, or delete data, or create new accounts with full user rights, depending on the context in which the vulnerable application runs.
Remediation
- Apply the security update released by Microsoft in January 2020 security updates.
- Ensure that all .NET Framework installations are updated to the latest patched version.
- Restrict SharePoint workflow creation and modification permissions to trusted users only.
- Monitor SharePoint logs for suspicious workflow creation or modification activities.
- Consider implementing network segmentation to limit the impact of potential exploitation.
- Review and validate all existing SharePoint workflows for potential malicious content.
- Implement the principle of least privilege for SharePoint users and service accounts.
- Consider using Microsoft Defender ATP or similar security solutions to detect and prevent exploitation attempts.
References
- Microsoft Security Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0646
- Packet Storm Security - SharePoint Workflows XOML Injection: http://packetstormsecurity.com/files/156930/SharePoint-Workflows-XOML-Injection.html
- Common Weakness Enumeration (CWE-91): https://cwe.mitre.org/data/definitions/91.html
- Microsoft January 2020 Security Updates: https://msrc.microsoft.com/update-guide/releaseNote/2020-Jan
Early Warning
Armis Early Warning customers received an advanced alert on this vulnerability.
- Armis Alert Date
- Jan 7, 2021
- CISA KEV Date
- Nov 3, 2021
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- ManufacturingManufacturing
- Health Care & Social AssistanceHealth Care & Social Assistance
- Public AdministrationPublic Administration
- Educational ServicesEducational Services
- Finance and InsuranceFinance and Insurance
- Transportation & WarehousingTransportation & Warehousing
- Retail TradeRetail Trade
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Other Services (except Public Administration)Other Services (except Public Administration)
- UtilitiesUtilities
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- InformationInformation
- Accommodation & Food ServicesAccommodation & Food Services
- ConstructionConstruction
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- MiningMining
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- Wholesale TradeWholesale Trade
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services