CVE-2022-30157: Microsoft SharePoint Server Remote Code Execution Vulnerability

Overview

Severity
High (CVSS 8.8)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Remote Code Execution
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2022-Jun
Released
2022-06-14
Last Updated
2022-06-21
EPSS Score
16.21% (percentile: 94.8%)

FAQ

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? The attacker must be authenticated and possess the permissions for page creation to be able to exploit this vulnerability. How could an attacker exploit this vulnerability? In a network-based attack an attacker would need to have the privileges to create a page on a vulnerable SharePoint server. By creating a site using specific code, the attacker could execute code remotely on the target server.

Affected Products (4)

Microsoft Office

  • Microsoft SharePoint Enterprise Server 2016
  • Microsoft SharePoint Enterprise Server 2013 Service Pack 1
  • Microsoft SharePoint Server 2019
  • Microsoft SharePoint Server Subscription Edition

Security Updates (4)

Acknowledgments

Yuhao Weng (<a href="https://twitter.com/cjm00nw">@cjm00nw</a>) & Zhiniang Peng(<a href="https://twitter.com/edwardzpeng">@edwardzpeng</a>) of <a href="https://www.sangfor.com">Sangfor</a>, H01 and H02 from FPT Software Cyber Security Assurance Service working with <a href="https://www.zerodayinitiative.com/">Trend Micro Zero Day Initiative</a>

Revision History

  • 2022-06-14: Information published.
  • 2022-06-21: Added acknowledgements. This is an informational change only.