Skip to main content

CVE-2024-49062: CWE-23: Relative Path Traversal in Microsoft Microsoft SharePoint Enterprise Server 2016

Medium
VulnerabilityCVE-2024-49062cvecve-2024-49062cwe-23
Published: Tue Dec 10 2024 (12/10/2024, 17:49:35 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft SharePoint Enterprise Server 2016

Description

Microsoft SharePoint Information Disclosure Vulnerability

AI-Powered Analysis

AILast updated: 07/04/2025, 20:09:42 UTC

Technical Analysis

CVE-2024-49062 is a medium-severity vulnerability classified under CWE-23 (Relative Path Traversal) affecting Microsoft SharePoint Enterprise Server 2016, specifically version 16.0.0. This vulnerability allows an authenticated user with low privileges (PR:L) to exploit a relative path traversal flaw over a network (AV:N) without requiring user interaction (UI:N). The flaw enables the attacker to manipulate file paths to access sensitive files or information outside the intended directory structure, leading to information disclosure (C:H) without impacting integrity or availability. The vulnerability does not require elevated privileges beyond low-level authentication and has a CVSS 3.1 base score of 6.5, indicating a moderate risk. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was reserved in October 2024 and published in December 2024. Given SharePoint's role as a widely used enterprise collaboration and document management platform, this vulnerability could expose confidential organizational data if exploited.

Potential Impact

For European organizations, the impact of CVE-2024-49062 could be significant due to the widespread use of Microsoft SharePoint Enterprise Server 2016 in government, financial, healthcare, and corporate sectors. The vulnerability allows unauthorized disclosure of sensitive documents and information, potentially leading to data breaches, loss of intellectual property, and exposure of personal data protected under GDPR. Such information disclosure could facilitate further targeted attacks, espionage, or compliance violations. Although the vulnerability does not allow modification or destruction of data, the confidentiality breach alone can cause reputational damage and regulatory penalties. The requirement for authenticated access somewhat limits exposure but insider threats or compromised credentials could be leveraged by attackers. The lack of known exploits currently provides a window for organizations to proactively mitigate risk before active exploitation emerges.

Mitigation Recommendations

European organizations should prioritize the following specific mitigation steps: 1) Conduct an immediate audit of SharePoint Enterprise Server 2016 instances to identify affected versions (16.0.0). 2) Restrict access to SharePoint servers to trusted users and enforce strong authentication mechanisms, including multi-factor authentication, to reduce risk from compromised credentials. 3) Implement strict access controls and least privilege principles on SharePoint content and server directories to limit the impact of path traversal exploitation. 4) Monitor SharePoint logs and network traffic for unusual access patterns indicative of path traversal attempts or unauthorized file access. 5) Apply any forthcoming security patches or updates from Microsoft promptly once available. 6) Consider deploying Web Application Firewalls (WAF) with custom rules to detect and block path traversal payloads targeting SharePoint. 7) Educate administrators and users about the risks of credential compromise and the importance of secure password hygiene. These targeted actions go beyond generic advice by focusing on access control, monitoring, and proactive patch management tailored to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-10-11T20:57:49.189Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9815c4522896dcbd60d3

Added to database: 5/21/2025, 9:08:37 AM

Last enriched: 7/4/2025, 8:09:42 PM

Last updated: 8/7/2025, 12:35:13 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats