Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2019-0604 | First vendor Publication | 2019-03-05 |
Vendor | Cve | Last vendor Modification | 2019-12-13 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 9.8 | ||
Base Score | 9.8 | Environmental Score | 9.8 |
impact SubScore | 5.9 | Temporal Score | 9.8 |
Exploitabality Sub Score | 3.9 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0594. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0604 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Application | 1 | |
Application | 2 |
SAINT Exploits
Description | Link |
---|---|
Microsoft SharePoint Picker.aspx deserialization vulnerability | More info here |
Snort® IPS/IDS
Date | Description |
---|---|
2020-11-03 | Microsoft SharePoint EntityInstanceIdEncoder remote code execution attempt RuleID : 55862 - Revision : 2 - Type : SERVER-WEBAPP |
2019-08-29 | Win.Backdoor.Agent webshell inbound request attempt RuleID : 51368-community - Revision : 2 - Type : MALWARE-BACKDOOR |
2019-10-01 | Win.Backdoor.Agent webshell inbound request attempt RuleID : 51368 - Revision : 2 - Type : MALWARE-BACKDOOR |
2019-12-19 | Win.Backdoor.Chopper webshell inbound request attempt RuleID : 50277-community - Revision : 4 - Type : MALWARE-BACKDOOR |
2019-07-02 | Win.Backdoor.Chopper webshell inbound request attempt RuleID : 50277 - Revision : 4 - Type : MALWARE-BACKDOOR |
2019-12-19 | Win.Backdoor.Chopper webshell inbound request attempt RuleID : 50276-community - Revision : 3 - Type : MALWARE-BACKDOOR |
2019-07-02 | Win.Backdoor.Chopper webshell inbound request attempt RuleID : 50276 - Revision : 3 - Type : MALWARE-BACKDOOR |
2019-07-02 | Microsoft SharePoint EntityInstanceIdEncoder remote code execution attempt RuleID : 50275 - Revision : 1 - Type : SERVER-WEBAPP |
2019-05-21 | Microsoft SharePoint EntityInstanceIdEncoder remote code execution attempt RuleID : 49861 - Revision : 4 - Type : SERVER-WEBAPP |
Sources (Detail)
Source | Url |
---|---|
BID | http://www.securityfocus.com/bid/106914 |
CONFIRM | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0604 |
Alert History
Date | Informations |
---|---|
2021-05-04 13:22:21 |
|
2021-04-22 02:37:23 |
|
2020-11-03 21:23:19 |
|
2020-05-23 02:20:40 |
|
2020-03-11 21:18:20 |
|
2019-06-10 17:19:22 |
|
2019-03-07 17:19:32 |
|
2019-03-06 17:19:05 |
|
2019-03-06 05:19:08 |
|