{"vulnerability": "CVE-2020-0932", "sightings": [{"uuid": "fab4bc29-e169-4823-ad5a-4efcb376f92b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0932", "type": "published-proof-of-concept", "source": "https://t.me/cKure/438", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 Anonymous researcher reports #zeroday vulnerability in #SharePoint's #TypeConversion method causing Arbitrary #CodeExecution.\n\nTechnical: The vulnerability exists because SharePoint does not restrict available Types for properties when it parses the XML configuration of\u00a0WebParts. For a property, an attacker may specify a string and a type name, and SharePoint will attempt to convert the string using a\u00a0TypeConvertercorresponding to the specified type. Some TypeConverters present in the SharePoint libraries can be used for arbitrary code execution.\nThe entry point for this attack is the\u00a0WebPartPages\u00a0web service found at:\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0http:///_vti_bin/WebPartPages.asmx\nWithin the implementation of this web service there are several methods that deal with parsing XML WebParts configuration, one of which is\u00a0RenderWebPartForEdit.\n\nhttps://www.zerodayinitiative.com/blog/2020/4/28/cve-2020-0932-remote-code-execution-on-microsoft-sharepoint-using-typeconverters", "creation_timestamp": "2020-04-30T08:39:08.000000Z"}, {"uuid": "5528108c-7fbe-472b-8da0-ea2c7b39c0c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0932", "type": "published-proof-of-concept", "source": "https://t.me/R0_Crew/1552", "content": "CVE-2020-0932: Remote Code Execution on Microsoft SharePoint Using TypeConverters https://www.thezdi.com/blog/2020/4/28/cve-2020-0932-remote-code-execution-on-microsoft-sharepoint-using-typeconverters #exploit #dukeBarman", "creation_timestamp": "2020-05-09T17:47:37.000000Z"}, {"uuid": "a1439016-af17-407c-95b7-5c624d03a772", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0932", "type": "published-proof-of-concept", "source": "https://t.me/antichat/8362", "content": "CVE-2020-0932: Remote Code Execution on Microsoft SharePoint Using TypeConverters https://www.thezdi.com/blog/2020/4/28/cve-2020-0932-remote-code-execution-on-microsoft-sharepoint-using-typeconverters #exploit #dukeBarman", "creation_timestamp": "2020-05-09T11:48:38.000000Z"}, {"uuid": "4f2351fb-507a-4880-b7d4-9c5e24d63bcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0932", "type": "published-proof-of-concept", "source": "https://t.me/hybgl/185", "content": "#windows #rce #cve #xxe #sharepoint\n\n[ CVE-2020-0932 ]\nhttps://www.thezdi.com/blog/2020/4/28/cve-2020-0932-remote-code-execution-on-microsoft-sharepoint-using-typeconverters\n\n[ POC ]\nhttps://github.com/thezdi/PoC/tree/master/CVE-2020-0932", "creation_timestamp": "2020-04-30T11:33:16.000000Z"}, {"uuid": "06ebd023-4c91-494a-9e75-4d2d23ee71e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0932", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/1046", "content": "#exploit\n1. CVE-2020-12251,\nCVE-2020-12252:\nGigamon High-performance network packet brokers GigaVUE 5.5.01.11 - Directory Traversal/Insecure Permissions\nhttps://seclists.org/fulldisclosure/2020/Apr/56\n\n2. CVE-2020-0932:\nRCE on MS Sharepoint Using Typeconverters\nhttps://www.zerodayinitiative.com/blog/2020/4/28/cve-2020-0932-remote-code-execution-on-microsoft-sharepoint-using-typeconverters\n]-&gt; PoC: https://github.com/thezdi/PoC/tree/master/CVE-2020-0932", "creation_timestamp": "2024-10-22T15:53:13.000000Z"}, {"uuid": "dfb20e5e-86b9-4c4d-9526-80a3524ec337", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0932", "type": "published-proof-of-concept", "source": "https://t.me/techpwnews/525", "content": "CVE-2020-0932: Remote Code Execution on Microsoft SharePoint Using TypeConverters\n\nIn April 2020, Microsoft released four Critical and two Important-rated patches to fix remote code execution bugs in Microsoft SharePoint. All these are deserialization bugs. Two came through the ZDI program from an anonymous researcher: CVE-2020-0931 and CVE-2020-0932. This blog looks at that last CVE, also known as ZDI-20-468, in greater detail. Let\u2019s start by taking a look at the bug in action.\u00a0This vulnerability allows authenticated users to execute arbitrary code ...\n\nContinue reading at Zero Day Initiative - Blog", "creation_timestamp": "2020-04-29T19:06:26.000000Z"}, {"uuid": "d344d043-8cf4-4e6d-b83f-3785be8ff54e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0932", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/4216", "content": "CVE-2020-0932: REMOTE CODE EXECUTION ON MICROSOFT SHAREPOINT USING TYPECONVERTERS\n\nhttps://www.thezdi.com/blog/2020/4/28/cve-2020-0932-remote-code-execution-on-microsoft-sharepoint-using-typeconverters", "creation_timestamp": "2020-05-04T11:50:47.000000Z"}]}