漏洞信息详情
Microsoft .NET Framework、SharePoint Server和Visual Studio 安全漏洞
漏洞简介
Microsoft SharePoint等都是美国微软(Microsoft)公司的产品。Microsoft SharePoint是一套企业业务协作平台。Microsoft Visual Studio是一款开发工具套件系列产品,也是一个基本完整的开发工具集,Microsoft .NET Framework是一种全面且一致的编程模型,也是一个用于构建Windows、Windows Store、Windows Phone、Windows Server和Microsoft Azure的应用程序的开发平台。
Microsoft .NET Framework、SharePoint Server和Visual Studio中存在远程代码执行漏洞,该漏洞源于程序无法检查XML文件输入的源标记。攻击者可借助特制文档利用该漏洞在负责反序列化XML内容的进程的上下文中运行任意代码。以下产品及版本受到影响:Microsoft .NET Core 2.1版本,3.1版本;.NET Framework 2.0版本SP2,.NET Framework 3.0版本SP2,.NET Framework 3.5版本,3.5.1版本,4.5.2版本,4.6版本,4.6.1版本,4.6.2版本,4.7版本,4.7.1版本,4.7.2版本,4.8版本;SharePoint Enterprise Server 2013 SP1,SharePoint Enterprise Server 2016,SharePoint Server 2010 SP2,SharePoint Server 2019;Visual Studio 2017 15.9版本(包含15.0版本至15.8版本),Visual Studio 2019 16.0版本,Visual Studio 2019 16.4版本(包含16.0版本至16.3版本),Visual Studio 2019 16.6版本(包含16.0版本至16.5版本)。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2020-1147
参考网址
来源:MISC
链接:https://packetstormsecurity.com/files/158876/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html
来源:MISC
链接:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1147
来源:MISC
链接:https://www.exploitalert.com/view-details.html?id=35992
来源:MISC
链接:https://packetstormsecurity.com/files/158694/SharePoint-DataSet-DataTable-Deserialization.html
来源:portal.msrc.microsoft.com
链接:https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2020-1147
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158876/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Microsoft-Visual-Studio-vulnerabilities-of-July-2020-32824
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-1147
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2441/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158694/SharePoint-DataSet-DataTable-Deserialization.html
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2020-1147
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2445/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158467/Red-Hat-Security-Advisory-2020-2989-01.html
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/NET-Core-code-execution-via-XML-Source-Markup-32836
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2418/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158436/Red-Hat-Security-Advisory-2020-2954-01.html
来源:www.exploit-db.com
链接:https://www.exploit-db.com/exploits/50151
来源:cxsecurity.com
链接:https://cxsecurity.com/issue/WLB-2020080098
来源:cxsecurity.com
链接:https://cxsecurity.com/issue/WLB-2021070135
来源:www.exploit-db.com
链接:https://www.exploit-db.com/exploits/48747
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/163644/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html
受影响实体
暂无
补丁
- Microsoft .NET Framework、SharePoint Server和Visual Studio 安全漏洞的修复措施<!--2020-7-14-->
还没有评论,来说两句吧...