TippingPoint Zero Day Initiative

Microsoft SharePoint Server Arbitrary File Upload Remote Code Execution Vulnerability

ZDI-10-287: December 14th, 2010


CVSS Score

Affected Vendors

Affected Products


TippingPoint™ IPS Customer Protection

TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 10716. For further product information on the TippingPoint IPS:

Vulnerability Details

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Sharepoint Server utilizing Microsoft's Office Document Load Balancer. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the Office Document Conversions Launcher service and occurs due to insufficient parameter validation on a particular SOAP request. Sucessful exploitation will allow an attacker to upload and execute an arbitrary file on the target server.

Vendor Response

Microsoft has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline

    2010-03-12 - Vulnerability reported to vendor
    2010-12-14 - Coordinated public release of advisory


This vulnerability was discovered by:
    Oleksandr Mirosh