<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.gtconsult.com/blogs/tag/cve/feed" rel="self" type="application/rss+xml"/><title>GTconsult - Blog #CVE</title><description>GTconsult - Blog #CVE</description><link>https://www.gtconsult.com/blogs/tag/cve</link><lastBuildDate>Wed, 01 Apr 2026 02:55:52 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[SharePoint CVE-2020-1147]]></title><link>https://www.gtconsult.com/blogs/post/SharePoint-CVE-2020-1147</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/SharePoint-CVE-2020-1147.jpg"/>Microsoft has released a patch to fix CVE-2020-1147 which they have described as following. “A remote code execution vulnerability exists in .NET Frame ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_XXjIwd4UR9mZiSs6l8W84A" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_-aovkdn3QiWPdbz2Oh8K8A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ac5vMkZDT0K2V5r3MAOpSw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_KVN3MHD6ROK3kJtYFHlfJA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><p><span style="font-size:32px;">SharePoint CVE-2020-1147 now has a PoC</span></p></span></h2></div>
<div data-element-id="elm_D_tyqCoQTJuG4bpJ4LVuWA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_D_tyqCoQTJuG4bpJ4LVuWA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><span style="font-size:16px;">Microsoft has released a patch to fix <a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1147" target="_blank" rel="">CVE-2020-1147</a> which they have described as following.</span></p><p style="text-align:left;"><span style="font-size:16px;">“A remote code execution vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio when the software fails to check the source markup of XML file input. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the process responsible for deserialization of the XML content.</span></p><p style="text-align:left;"><span style="font-size:16px;">To exploit this vulnerability, an attacker could upload a specially crafted document to a server utilizing an affected product to process content.”</span></p><p style="text-align:left;"><span style="font-size:16px;">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:16px;">Basically,&nbsp;<span style="color:inherit;text-align:center;">low privileged user&nbsp;</span>who knows what they are doing can get remote code execution on the SharePoint server.&nbsp; Technically you don’t even need SharePoint running as it affects .Net applications, so it’s a pretty big issue.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:16px;">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:16px;">The bug was discovered by <em><a href="https://twitter.com/olekmirosh" title="Oleksandr Mirosh" target="_blank" rel="">Oleksandr Mirosh</a>,&nbsp;<a href="https://twitter.com/mwulftange" target="_blank" rel="">Markus Wulftange</a>&nbsp;and&nbsp;<a href="https://www.linkedin.com/in/jonathan-birch-ab27681/" target="_blank" rel="">Jonathan Birch</a></em><em> and you can check out the <a href="https://srcincite.io/blog/2020/07/20/sharepoint-and-pwn-remote-code-execution-against-sharepoint-server-abusing-dataset.html" target="_blank" rel="">PoC</a> if you really want to understand more.</em></span></p><p style="text-align:left;"><span style="font-size:16px;">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:16px;">I would recommend that everyone gets to patching ASAP as this could be used for lateral movement and privilege escalation to gain domain control.</span></p><p style="text-align:left;"><span style="font-size:16px;">&nbsp;</span></p><p><span style="color:inherit;font-size:16px;"></span></p><p style="text-align:left;"><span style="font-size:16px;">If your business has an <a href="https://www.gtconsult.com/support">A Team Support agreement</a> you have already been patched.</span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 21 Jul 2020 11:12:36 +0000</pubDate></item></channel></rss>