6.5
CVSSv2

CVE-2021-31181

Published: 11/05/2021 Updated: 02/08/2023
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

This vulnerability allows remote malicious users to execute arbitrary code on affected installations of Microsoft SharePoint. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of server-side controls in WebParts. By specifying a control using a non-canonical string, an unsafe server-side control can be instantiated. An attacker can leverage this vulnerability to execute code in the context of the service account.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft sharepoint foundation 2013

microsoft sharepoint enterprise server 2016

microsoft sharepoint server 2019

Exploits

The EditingPageParserVerifyControlOnSafeList method fails to properly validate user supplied data This can be leveraged by an attacker to leak sensitive information in rendered-preview content This module will leak the ViewState validation key and then use it to sign a crafted object that will trigger code execution when deserialized Tested aga ...