According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? The attacker must be authenticated and possess the permissions for page creation to be able to exploit this vulnerability. How could an attacker exploit this vulnerability? In a network-based attack an attacker would need to have the privileges to create a page on a vulnerable SharePoint server. By creating a site using specific code, the attacker could execute code remotely on the target server.
Yuhao Weng (<a href="https://twitter.com/cjm00nw">@cjm00nw</a>) & Zhiniang Peng(<a href="https://twitter.com/edwardzpeng">@edwardzpeng</a>) of <a href="https://www.sangfor.com">Sangfor</a>, H01 and H02 from FPT Software Cyber Security Assurance Service working with <a href="https://www.zerodayinitiative.com/">Trend Micro Zero Day Initiative</a>