What:
An attacker who successfully exploited the vulnerability could execute arbitrary script in the security context of the logged-on user. The script could then, for example, take actions on the affected SharePoint site on behalf of the logged-on user with the same permissions as the logged-on user.
How:
An attacker could modify certain lists within SharePoint to exploit this vulnerability, and then convince users to browse to the modified list.
Risk:
Systems running an affected version of SharePoint Server that also support the mobile browser view are primarily at risk.
Mitigation:
In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit these vulnerabilities and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit these vulnerabilities. An attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to the attacker’s website, or by getting them to open an attachment sent through email.
Workaround:
None identified
References
- Microsoft Security Bulletin MS14-073 – Important
- MS14-073: Vulnerability in Microsoft SharePoint Foundation could allow for elevation of privilege: November 11, 2014
- MS14-073: Description of the security update for SharePoint Foundation 2010: November 11, 2014
- CVE-2014-4116
- National Vulnerability Database
- Security Update for Microsoft SharePoint Foundation 2010 (KB2889838)