9.8
CVSSv3

CVE-2019-0604

Published: 05/03/2019 Updated: 13/12/2019
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 670
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0594.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft sharepoint foundation 2013

microsoft sharepoint server 2019

microsoft sharepoint enterprise server 2016

microsoft sharepoint server 2010

Github Repositories

Desharialize Desharialize: Easy mode to Exploit CVE-2019-0604 (Sharepoint XML Deserialization Unauthenticated RCE) What is it? While there have been public POCs for CVE-2019-0604, I have noticed that those POCs are not clear, extensible or flexible Some of them only have on hardcoded (and serialized/encoded) payloads, some of them require running custom NET code before every

Topics: Iranian Hackers Target Albania's Border Control System in a Tit-for-Tat Operation/ New APT targets telcos, ISP's and universities in the Middle East and Africa

Cybersecurity-Current-Event-Report Topics: Iranian Hackers Target Albania's Border Control System in a Tit-for-Tat Operation/ New APT targets telcos, ISP's and universities in the Middle East and Africa Iranian Hackers Target Albania's Border Control System in a Tit-for-Tat Operation The recent attacks on Albania's BCS

Generate Seralize Payload for CVE-2019-0604 for Sharepoint 2010 SP2 .net 3.5

cve-2019-0604-SP2010-netv35 Recently, I came across a Sharepoint 2010 SP2 and all the Proof of Concept that I tested didn't work until I realized that the server was on net 35 which require a different library Here is the dll for net 35 The code came from githubcom/linhlhq/CVE-2019-0604 It will generate the serialize payload

CVE-2019-0604

CVE-2019-0604 CVE-2019-0604 From wwwthezdicom/blog/2019/3/13/cve-2019-0604-details-of-a-microsoft-sharepoint-rce-vulnerability

CVE-2019-0604 CVE-2019-0604 From wwwthezdicom/blog/2019/3/13/cve-2019-0604-details-of-a-microsoft-sharepoint-rce-vulnerability

cve-2019-0604 SharePoint RCE exploit

CVE-2019-0604 cve-2019-0604 SharePoint RCE exploit blog: wwwcnblogscom/k8gege/p/11093992html wiki: githubcom/k8gege/K8CScan/wiki/%E6%BC%8F%E6%B4%9E%E5%88%A9%E7%94%A8-CVE-2019-0604-SharePoint-GetShell-Exploit

详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload

一、解说k8gege的cve-2019-0604-exppy k8gege的脚本 githubcom/k8gege/CVE-2019-0604 老实说k8gege的py脚本有点花哨,一大堆的16进制字符串,分成 payload1,2,3, 好坏呀 python脚本远程post的payload,反序列化之后是一个xml数据体 <ResourceDictionary xmlns="schemasmicrosoftcom/winfx/2006/xaml/presentation"

ysoserial.net for Windows execute file

ysoserialnet ysoserialnet for Windows execute file Usage ysoserialexe -h ysoserialnet generates deserialization payloads for a variety of NET formatters Available gadgets: ActivitySurrogateDisableTypeCheck (Disables 48+ type protections for ActivitySurrogateSelector, command is ignored) Formatters: BinaryFormatter, LosFormatter, NetDataContractSerializer, ObjectStateFor

ysoserialnet ysoserialnet for Windows execute file Usage ysoserialexe -h ysoserialnet generates deserialization payloads for a variety of NET formatters Available gadgets: ActivitySurrogateDisableTypeCheck (Disables 48+ type protections for ActivitySurrogateSelector, command is ignored) Formatters: BinaryFormatter, LosFormatter, NetDataContractSerializer, ObjectStateFor

Recent Articles

Microsoft Patch Tuesday – February 2019
Symantec Threat Intelligence Blog • Ratheesh PM • 13 Feb 2024

This month the vendor has patched 74 vulnerabilities, 20 of which are rated Critical.

Posted: 13 Feb, 201922 Min ReadThreat Intelligence SubscribeFollowtwitterfacebooklinkedinMicrosoft Patch Tuesday – February 2019This month the vendor has patched 74 vulnerabilities, 20 of which are rated Critical.As always, customers are advised to follow these security best practices: Install vendor patches as soon as they are available. Run all software with the least privileges required while still maintaining functionality. Avoid hand...

Chinese espionage group targets Israel while suggesting the source could be Iran
The Register • Simon Sharwood, APAC Editor • 11 Aug 2021

Get our weekly newsletter FireEye says Israeli defense agencies were alert to compromises as China works to protect Belt and Road investments

Security vendor FireEye says it has spotted a Chinese espionage group that successfully compromised targets within Israel, and that trying to make its efforts look like the work of Iranian actors is part of the group's modus operandi. A FireEye blog post states the Chinese activity has been ongoing since 2019, when a group it names "UNC215" used the Microsoft SharePoint vulnerability CVE-2019-0604 "to install web shells and FOCUSFJORD payloads at targets in the Middle East and Central Asia". "In...

US-CERT lists the 10 most-exploited security bugs and, yeah, it's mostly Microsoft holes people forgot to patch
The Register • Shaun Nichols in San Francisco • 14 May 2020

Update, update, update. Plus: Flash, Struts, Drupal also make appearances Sadly, 111 in this story isn't binary. It's decimal. It's the number of security fixes emitted by Microsoft this week

Vulnerabilities in Microsoft Windows, Office, and Windows Server, for which patches have been available for years, continue to be the favorite target for hackers looking to spread malware. A list posted by US-CERT this week rattles off the 10 most oft-targeted security vulnerabilities during the past three years, and finds that, shock horror, for the most part, keeping up with patching will keep you safe. Microsoft ranks highly in the list because its software is widely used, and provides the mo...

UN didn't patch SharePoint, got mega-hacked, covered it up, kept most staff in the dark, finally forced to admit it
The Register • Kieren McCarthy in San Francisco • 29 Jan 2020

For an organization accused of being 'all talk, no action', there's not even enough talking – to its own employees Who honestly has a crown prince in their threat model? UN report officially fingers Saudi royal as Bezos hacker

The United Nations’ European headquarters in Geneva and Vienna were hacked last summer, putting thousands of staff records at miscreants' fingertips. Incredibly, the organization decided to cover it up without informing those affected nor the public. That is the extraordinary claim of The New Humanitarian, which until a few years ago was an official UN publication covering humanitarian crises. Today, it said the UN has confirmed both the hack and the decision not to divulge any details. Dozens...

APT trends report Q2 2019
Securelist • GReAT • 01 Aug 2019

For two years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. The summaries are based on our threat intelligence research and provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports. They aim to highlight the significant events and findings that we feel people should be aware of. This is our latest installment, focusing on activities tha...

It's now 2019, and your Windows DHCP server can be pwned by a packet, IE and Edge by a webpage, and so on
The Register • Shaun Nichols in San Francisco • 13 Feb 2019

Hefty load from Microsoft, Adobe, with special guest star Cisco Everyone screams patch ASAP – but it takes most organizations a month to update their networks

Patch Tuesday Microsoft and Adobe have teamed up to give users and sysadmins plenty of work to do this week. The February edition of Patch Tuesday includes more than 70 CVE-listed vulnerabilities from each vendor – yes, each – as well as a critical security fix from Cisco. You should patch them as soon as it is possible. For Redmond, the February dump covers 77 CVE-listed bugs across Windows, Office, and Edge/IE. Among the most potentially serious was CVE-2019-0626, a remote code execution v...