V-17187 | Medium | Trust Bar Notifications for unsigned application add-ins must be blocked. | If an application is configured to require all add-ins to be signed by a trusted publisher, any unsigned add-ins the application loads will be disabled and the application will display the Trust... |
V-17667 | Medium | Disabling sending form templates with the email forms must be configured. | InfoPath allows users to attach form templates when sending email forms. If users are able to open form templates included with email forms, rather than using a cached version that is previously... |
V-26620 | Medium | Disabling opening forms with managed code from the Internet security zone must be configured. | When InfoPath solutions are opened locally, the location of the form is checked so that updates to the form can be downloaded. If a user saves a form locally from a location on the Internet and... |
V-17580 | Medium | Opening behavior for Email forms containing code or scripts must be controlled. | InfoPath notifies and prompts users before opening InfoPath email forms that contain code or script. If this restriction is relaxed, InfoPath will open email forms that contain code or script... |
V-17663 | Medium | Disabling the opening of solutions from the Internet Security Zone must be configured. | Attackers could use InfoPath solutions published to Internet Web sites to try to obtain sensitive information from users. By default, users can open InfoPath solutions that do not contain managed... |
V-17764 | Medium | Unsafe file types must be prevented from being attached to InfoPath forms. | Users can attach any type of file to forms except potentially unsafe files that might contain viruses, such as .bat or .exe files. For the full list of file types that InfoPath disallows by... |
V-17745 | Medium | Beaconing UI shown for opened forms must be configured. | Malicious users can create InfoPath forms with embedded Web beacons that can be used to contact an external server when the user opens the form. Information could be gathered by the form, or... |
V-17746 | Medium | Beaconing of UI forms with ActiveX controls must be enforced. | InfoPath makes it possible to host InfoPath forms in other applications as ActiveX controls. Such controls are known as InfoPath form controls. A malicious user could insert a web beacon into one... |
V-17668 | Medium | InfoPath 2003 forms as email forms in InfoPath 2013 must be disallowed. | An attacker might target InfoPath 2003 forms to try and compromise an organization's security. InfoPath 2003 did not write a published location for email forms, which means forms could open... |
V-26697 | Medium | The InfoPath APTCA Assembly Allowable List must be enforced. | InfoPath 2013 forms' business logic can only call into Global Assembly Cache (GAC) assemblies listed in the APTCA Assembly Allowable List. If this configuration is changed, forms can call into any... |
V-17611 | Medium | Email with InfoPath forms must be configured to show UI to recipients. | Malicious users could send InfoPath email forms with embedded web beacons that can be used to track when recipients open the form and provide confirmation that recipients' email addresses are... |
V-26619 | Medium | InfoPath email forms in Outlook must be disallowed. | Attackers can send users InfoPath email forms in an attempt to gain access to confidential information. Depending on the level of trust of the forms, it might also be possible to gain access to... |
V-26618 | Medium | InfoPath must be enforced to not use email forms from the Intranet security zone. | InfoPath email forms can be designed by an internal attacker and sent over the local intranet, and users might fill out such forms and provide sensitive information to the attacker. By default,... |
V-17658 | Medium | Disabling of Fully Trusted Solutions access to computers must be configured. | InfoPath users can choose whether to allow trusted forms to run on their computers. The Full Trust security level allows a form to access local system resources, such as COM components or files on... |
V-17657 | Medium | Disabling email forms running in Restricted Security Level must be configured. | InfoPath forms running with the restricted security level, can only access data stored on the forms. However, a malicious user could still send an email form running with the restricted security... |
V-17656 | Medium | Disabling email forms from the Internet Security Zone must be configured. | InfoPath email forms can be designed by an external attacker and sent over the Internet as part of a phishing attempt. Users might fill out such forms and provide sensitive information to the... |
V-17655 | Medium | Disabling of email forms from the Full Trust Security Zone must be configured. | InfoPath provides three security levels for form templates: Restricted, Domain, and Full Trust. The security levels determine whether a form template can access data on other domains, or access... |
V-17654 | Medium | Disable dynamic caching of the form template in InfoPath eMail forms. | By default, InfoPath 2007 caches form templates when they are attached to a mail item that is recognized as an InfoPath e-mail form. When users fill out forms that open with a restricted security... |
V-17758 | Medium | Offline Mode capability to cache queries for offline mode must be configured. | InfoPath can function in online mode or offline mode. It can also cache queries for use in offline mode. If offline mode is used and cached queries are enabled, sensitive information contained in... |
V-26589 | Medium | Add-ins to Office applications must be signed by a Trusted Publisher. | Office 2013 applications do not check the digital signature on application add-ins before opening them. Disabling or not configuring this setting may allow an application to load a dangerous... |
V-26621 | Medium | A form that is digitally signed must be displayed with a warning. | This setting controls whether or not the user sees a dialog box when opening Microsoft InfoPath forms containing digitally signed content. By default, InfoPath shows the user a warning message... |
V-17471 | Medium | All automatic loading from Trusted Locations must be disabled. | Trusted locations specified in the Trust Center are used to define file locations assumed to be safe. Content, code, and add-ins are allowed to load from trusted locations with a minimal amount of... |
V-17576 | Medium | Redirection behavior for upgraded web sites by SharePoint must be blocked. | InfoPath automatically redirects user requests for sites that have not been upgraded to the temporary URL if it is located on the local intranet, but blocks them if the temporary URL is located... |