Microsoft SharePoint Multiple Vulnerabilities


Description   Multiple vulnerabilities have been reported in Microsoft SharePoint, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to conduct cross-site scripting attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.
1) An error when handling an unassigned workflow can be exploited to cause the W3WP process to stop responding via a specially crafted URL.
2) An error when handling certain objects can be exploited to corrupt memory.
For more information see vulnerability #1:
SA54739
3) An error related to MAC exists when handling unassigned workflows.
Successful exploitation of the vulnerabilities #2 and #3 allows execution of arbitrary code.
4) Input passed via the "ms-descriptionText > ctl00_PlaceHolderDialogBodySection_PlaceHolderDialogBodyMainSection_ValSummary" parameter related to metadata storage assignment of the BDC permission management within the "Sharepoint Online Cloud 2013 Service" section is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site if malicious data is viewed.
5) Certain unspecified input is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
6) Multiple unspecified errors can be exploited to cause memory corruption.
For more information see vulnerability #2 in:
SA54737
     
Vulnerable Products   Vulnerable Software:
Microsoft Office SharePoint Portal Server 2003Microsoft Office SharePoint Server 2007Microsoft Office Web AppsMicrosoft SharePoint Foundation 2010Microsoft SharePoint Server 2007Microsoft SharePoint Server 2010Microsoft SharePoint Server 2013Microsoft Windows SharePoint Services 2.xMicrosoft Windows SharePoint Services 3.x
     
Solution   Apply updates.-- Microsoft Server Software ---- Microsoft SharePoint Portal Server 2003 Service Pack 3 --Microsoft Windows SharePoint Services 2.0: http://www.microsoft.com/downloads/details.aspx?familyid=9671826e-9726-4a04-8f07-53f6f61933a2-- Microsoft SharePoint Server 2007 Service Pack 3 --Microsoft Windows SharePoint Services 3.0 Service Pack 3 (32-bit versions): http://www.microsoft.com/downloads/details.aspx?familyid=a59f24cf-88f4-4f0d-b3a7-dd6c4f4bd27eMicrosoft Windows SharePoint Services 3.0 Service Pack 3 (64-bit versions): http://www.microsoft.com/downloads/details.aspx?familyid=8d4ba185-e9c5-442c-87ec-b36f6e660036-- Microsoft SharePoint Server 2010 Service Pack 1 --Microsoft SharePoint Foundation 2010 Service Pack 1 (wss): http://www.microsoft.com/downloads/details.aspx?familyid=2a1d0d9e-434c-412f-9996-59b078d19f1aMicrosoft SharePoint Server 2010 Service Pack 1 (coreserver): http://www.microsoft.com/downloads/details.aspx?familyid=99c06078-47f4-4c11-ac6e-a241e734c1deMicrosoft SharePoint Server 2010 Service Pack 1 (wosrv): http://www.microsoft.com/downloads/details.aspx?familyid=875a7a0d-bb52-40cc-9b84-0a42f94b6ed4-- Microsoft SharePoint Server 2010 Service Pack 2 --Microsoft SharePoint Foundation 2010 Service Pack 2 (wss): http://www.microsoft.com/downloads/details.aspx?familyid=2a1d0d9e-434c-412f-9996-59b078d19f1aMicrosoft SharePoint Server 2010 Service Pack 2 (coreserver): http://www.microsoft.com/downloads/details.aspx?familyid=99c06078-47f4-4c11-ac6e-a241e734c1deMicrosoft SharePoint Server 2010 Service Pack 2 (wosrv): http://www.microsoft.com/downloads/details.aspx?familyid=875a7a0d-bb52-40cc-9b84-0a42f94b6ed4-- Microsoft SharePoint Server 2013 --Microsoft SharePoint Foundation 2013: http://www.microsoft.com/downloads/details.aspx?familyid=5d0b13b4-a884-4eb8-9267-3fece3569610Microsoft SharePoint Server 2013 (coreserverloc): http://www.microsoft.com/downloads/details.aspx?familyid=4fa577f9-fb1e-40e7-b8b1-b0bb83c4827c-- Microsoft Office Services and Web Apps ---- Microsoft SharePoint Server 2007 Service Pack 3 --Microsoft SharePoint Server 2007 Service Pack 3 (32-bit editions) (Excel Services): http://www.microsoft.com/downloads/details.aspx?familyid=da6a7ffd-a496-4b45-9fa6-5ca37afed5edMicrosoft SharePoint Server 2007 Service Pack 3 (64-bit editions) (Excel Services): http://www.microsoft.com/downloads/details.aspx?familyid=482f593b-ffc8-476a-a919-811f5323b020-- Microsoft SharePoint Server 2010 Service Pack 1 --Microsoft SharePoint Server 2010 Service Pack 1 (Excel Services): http://www.microsoft.com/downloads/details.aspx?familyid=bebcbb54-bc41-44f1-917f-1c519fdf0199Microsoft SharePoint Server 2010 Service Pack 1 (Microsoft Business Productivity Servers): http://www.microsoft.com/downloads/details.aspx?familyid=06e73ac6-d97b-40fc-ba49-e9030839218bMicrosoft SharePoint Server 2010 Service Pack 1 (Word Automation Services): http://www.microsoft.com/downloads/details.aspx?familyid=20d7559c-f400-4b7b-a614-25bdda93d455-- Microsoft SharePoint Server 2010 Service Pack 2 --Microsoft SharePoint Server 2010 Service Pack 2 (Excel Services): http://www.microsoft.com/downloads/details.aspx?familyid=bebcbb54-bc41-44f1-917f-1c519fdf0199Microsoft SharePoint Server 2010 Service Pack 2 (Microsoft Business Productivity Servers): http://www.microsoft.com/downloads/details.aspx?familyid=06e73ac6-d97b-40fc-ba49-e9030839218bMicrosoft SharePoint Server 2010 Service Pack 2 (Word Automation Services): http://www.microsoft.com/downloads/details.aspx?familyid=20d7559c-f400-4b7b-a614-25bdda93d455-- Microsoft Office Web Apps 2010 --Microsoft Excel Web App 2010 Service Pack 1: http://www.microsoft.com/downloads/details.aspx?familyid=aca91046-3118-47d3-94de-c44ddfeb9363Microsoft Word Web App 2010 Service Pack 1: http://www.microsoft.com/downloads/details.aspx?familyid=cd1b2a12-f6f4-40d0-9461-5ee8d3571bf2Microsoft Excel Web App 2010 Service Pack 2: http://www.microsoft.com/downloads/details.aspx?familyid=aca91046-3118-47d3-94de-c44ddfeb9363Microsoft Word Web App 2010 Service Pack 2: http://www.microsoft.com/downloads/details.aspx?familyid=cd1b2a12-f6f4-40d0-9461-5ee8d3571bf2-- Microsoft Office Web Apps 2013 --Microsoft Office Web Apps Server 2013: http://www.microsoft.com/downloads/details.aspx?familyid=1d8d3ca6-896d-4181-8e1b-188766aec3a8
     
CVE   CVE-2013-3857
CVE-2013-3855
CVE-2013-3849
CVE-2013-3848
CVE-2013-3847
CVE-2013-3180
CVE-2013-3179
CVE-2013-1330
CVE-2013-1315
CVE-2013-0081
     
References   MS13-067 (KB2553408
KB2760420
KB2760589
KB2760594
KB2760595
KB2760755
KB2810061
KB2810067
KB2810083
KB2817305
KB2817315
KB2817372
KB2817384
KB2817393
KB2834052):
http://technet.microsoft.com/en-us/security/bulletin/ms13-067
Vulnerability Lab:
http://www.vulnerability-lab.com/get_content.php?id=812
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - GET : suspicious 'iframe' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'meta' tag found in URL
3.2.0
XSS - Prevention - POST : suspicious tag with event found in data
3.2.0
XSS - Prevention - GET : suspicious tag with event found in URL
3.2.0
XSS - Prevention - POST : suspicious 'meta' tag found in data
3.2.0
XSS - Prevention - POST : suspicious 'object' tag found in data
3.2.0
XSS - Prevention - GET : suspicious 'applet' tag found in URL
3.2.0
XSS - Prevention - POST : suspicious 'applet' tag found in data
3.2.0
XSS - Prevention - POST : 'location' javascript object found in data
3.2.0
XSS - Phishing : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' attribute found in URL
3.2.0
XSS - Prevention - POST : javascript code found in data
3.2.0
XSS - Prevention - POST : suspicious 'iframe' tag found in data
3.2.0
XSS - Prevention - GET : suspicious 'img' tag found in URL
3.2.0
XSS - Prevention - POST : code allowing cookie access found in data
3.2.0
XSS - Prevention - POST : suspicious 'img' attribute found in data
3.2.0
XSS - Phishing : suspicious 'a' tag found in URL
3.2.0
XSS - Prevention - GET : cookie access attempt using script language found in URL
3.2.0
XSS - Prevention - GET : suspicious 'embed' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'object' tag found in URL
3.2.0
XSS - Phishing : suspicious 'form' tag found in URL
3.2.0
XSS - Prevention - POST : suspicious 'embed' tag found in data
3.2.0
XSS - Prevention - POST : suspicious 'style' tag found in data
3.2.0
XSS - Prevention - GET : javascript code found in URL
3.2.0
XSS - Prevention - POST : suspicious 'div' tag found in data
3.2.0
XSS - Prevention - GET : evasion attempt using tag characters encoding in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' tag found in URL
3.2.0
XSS - Phishing : suspicious 'link' tag found in URL
3.2.0
XSS - Prevention - GET : 'script' tag found in URL
3.2.0
XSS - Prevention - POST : 'script' tag found in data
3.2.0
XSS - Prevention - POST : suspicious 'style' attribute found in data
3.2.0
XSS - Prevention - GET : 'location' javascript object found in URL
3.2.0
XSS - Prevention - GET : suspicious 'div' tag found in URL
3.2.0
Microsoft SharePoint denial of service vulnerability (CVE-2013-0081)
4.1.1
XSS - Prevention - POST : suspicious 'style' tag found in data
5.0.0
XSS - Prevention - POST : javascript code found in data
5.0.0
XSS - Prevention - POST : suspicious tag with event found in data
5.0.0
XSS - Prevention - POST : suspicious 'embed' tag found in data
5.0.0
XSS - Prevention - POST : 'location' javascript object found in data
5.0.0
XSS - Prevention - POST : code allowing cookie access found in data
5.0.0
SQL injection Prevention - GET : Evasion attempt with CAST and EXEC statements
5.0.0
XSS - Prevention - POST : 'script' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'style' attribute found in data
5.0.0
XSS - Prevention - POST : suspicious 'applet' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'div' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'img' attribute found in data
5.0.0
XSS - Prevention - POST : suspicious 'meta' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'object' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'iframe' tag found in data
5.0.0
     


 
 
 
 
 Risk level 
High 

 Vulnerability First Public Report Date 
2013-09-10 

 Target Type 
Server 

 Possible exploit 
Remote