This security update resolves a remote code execution vulnerability that exists in Microsoft SharePoint if the software does not check the source markup of an application package. To learn more about this vulnerability, see the following CVE descriptions:
- Microsoft Common Vulnerabilities and Exposures CVE-2019-1257
- Microsoft Common Vulnerabilities and Exposures CVE-2019-1260
- Microsoft Common Vulnerabilities and Exposures CVE-2019-1261
- Microsoft Common Vulnerabilities and Exposures CVE-2019-1295
- Microsoft Common Vulnerabilities and Exposures CVE-2019-1296
Note To apply this security update, you must have the release version of Microsoft SharePoint Server 2019 installed on the computer.
Improvements and fixes
When file paths on file shares are longer than the default Windows supported path length (260 characters), files are crawled without access control list (ACL) information.
Installing a SharePoint Server 2019 solution on a multi-server farm is an unreliable process and will not necessartily succeed.
When you attach a content database from a previous version of SharePoint Server to SharePoint Server 2019, existing "Table of Contents" web parts in that database would always have the "Show content from starting location" setting enabled after the upgrade. This update fixes this issue by preserving the original setting during upgrade.
Through the client-side object model (CSOM), the TaskLink ProjUid property for an external task returns the ID of its own project instead of the ID of the project that the task refers to. This update adds the ExternalProjectUid and ExternalTaskUid properties to the Task class to fix this issue.
Loading a timesheet is very slow and may take one minute or more.
Project Server Interface (PSI) API calls that require the permission of a farm administrator fail for users who are farm administrators but not server administrators.
How to get and install the update
Method 1: Microsoft Update
This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.
Method 2: Microsoft Update Catalog
To get the standalone package for this update, go to the Microsoft Update Catalog website.
Method 3: Microsoft Download Center
You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.
Security update deployment information
For deployment information about this update, see security update deployment information: September 10, 2019.
Security update replacement information
This security update replaces previously released security update 4475555.
File hash information
|File name||SHA1 hash||SHA256 hash|
The English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.