Lucene search

K
mskbMicrosoftKB4484352
HistoryMay 12, 2020 - 7:00 a.m.

Description of the security update for SharePoint Enterprise Server 2013: May 12, 2020

2020-05-1207:00:00
Microsoft
support.microsoft.com
33

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

5.6 Medium

AI Score

Confidence

High

3.5 Low

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

28.5%

Description of the security update for SharePoint Enterprise Server 2013: May 12, 2020

Summary

This security update resolves a cross-site-scripting (XSS) vulnerability that exists if Microsoft SharePoint Server does not correctly sanitize a specially crafted web request to an affected SharePoint server. This update also resolves a spoofing vulnerability that exists if Microsoft SharePoint Server does not correctly sanitize a specially crafted web request to an affected SharePoint server. To learn more about the vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2020-1100 and Microsoft Common Vulnerabilities and Exposures CVE-2020-1107.

Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft SharePoint Server 2013 installed on the computer.

Improvements and fixes

This security update contains a fix for the following nonsecurity issue:

  • Image uploads fail in SharePoint Server 2013 site feeds when the SharePoint Server 2013 farm consumes a User Profile service application from a SharePoint Server 2016 farm.

How to get and install the update

Method 1: Microsoft Update

This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Method 3: Microsoft Download Center

You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

More information

Security update deployment information

For deployment information about this update, see security update deployment information: May 12, 2020.

Security update replacement information

This security update replaces previously released security update 4484308.

File hash information

File name SHA1 hash SHA256 hash
coreserverloc2013-kb4484352-fullfile-x64-glb.exe F9A130075E65B6CF49B21B0AC9A4A0E3AAA4C98F 4EFF8925322764B59A9456D675A0654BF875071A51188FEA42EF357A93B789E6

File informationDownload the list of files that are included in security update 4484352.

Information about protection and security

Protect yourself online: Windows Security supportLearn how we guard against cyber threats: Microsoft Security

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

5.6 Medium

AI Score

Confidence

High

3.5 Low

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

28.5%