CVE-2019-0604 – Microsoft SharePoint Remote Code Execution Vulnerability


A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.

Exploitation of this vulnerability requires that a user uploads a specially crafted SharePoint application package to an affected versions of SharePoint.

The security update addresses the vulnerability by correcting how SharePoint checks the source markup of application packages.

The Zero Day Initiative (ZDI) has a through write up on the technical details of this vulnerability. The Canadian Centre for Cyber Security has some good information for indicators of compromise including hash values of compromised files and IP addresses.

Affected Versions

  • Microsoft SharePoint Foundation 2010 SP2
  • Microsoft SharePoint Server 2010 SP2
  • Microsoft SharePoint Foundation 2013 SP1
  • Microsoft SharePoint Server 2013 SP1
  • Microsoft SharePoint Enterprise Server 2016
  • Microsoft SharePoint Server 2019

Resolved Versions

Additional Information

Vulnerability Details

Severity: High

CVSS v2 Score: 9.3 (High)

CVSS v3 Score: 7.8 (High)

Family: Microsoft

Product: SharePoint

Status: Resolved

Vulnerability Release Date: 2019-02-12

KBs Release Date: 2019-04-25

Article Published: 2019-05-10

Article Last Updated: 2019-11-23