Article Details
Scrape Timestamp (UTC): 2023-09-29 18:09:09.311
Original Article Text
Click to Toggle View
Exploit released for Microsoft SharePoint Server auth bypass flaw. Proof-of-concept exploit code has surfaced on GitHub for a critical authentication bypass vulnerability in Microsoft SharePoint Server, allowing privilege escalation. Tracked as CVE-2023-29357, the security flaw can let unauthenticated attackers gain administrator privileges following successful exploitation in low-complexity attacks that don't require user interaction. "An attacker who has gained access to spoofed JWT authentication tokens can use them to execute a network attack which bypasses authentication and allows them to gain access to the privileges of an authenticated user," Microsoft explained in June when it patched the vulnerability. "An attacker who successfully exploited this vulnerability could gain administrator privileges. The attacker needs no privileges nor does the user need to perform any action." On September 25, STAR Labs researcher Nguyễn Tiến Giang (Janggggg) published a technical analysis describing the exploitation process for a chain of vulnerabilities. These include the CVE-2023-29357 bug and a second critical flaw identified as CVE-2023–24955, which facilitates remote code execution through command injection. Janggggg successfully achieved RCE on a Microsoft SharePoint Server using this exploit chain during the March 2023 Pwn2Own contest in Vancouver, earning a $100,000 reward. A day after the technical analysis was made public, a proof-of-concept exploit for the CVE-2023-29357 privilege escalation vulnerability surfaced on GitHub. Although this exploit does not grant attackers remote code execution, as it does not cover the entire exploit chain demonstrated at Pwn2Own Vancouver, the author clarifies that attackers could potentially combine it with the CVE-2023-24955 command injection bug to achieve this objective. "The script outputs details of admin users with elevated privileges and can operate in both single and mass exploit modes," the exploit's developer says. "However, to maintain an ethical stance, this script does not contain functionalities to perform RCE and is meant solely for educational purposes and lawful and authorized testing." A YARA rule is also available to help network defenders analyze logs for signs of potential exploitation on their SharePoint servers using the CVE-2023-29357 PoC exploit. Despite the existing exploit not granting immediate remote code execution capabilities, it is highly recommended to apply the security patches issued by Microsoft earlier this year as a preventive measure against potential attacks. Now that Janggggg has released technical details for both flaws, it is only a matter of time before threat actors or other security researchers reproduce the full exploit chain to achieve full remote code execution.
Daily Brief Summary
Proof-of-concept (PoC) exploit code for a critical authentication bypass vulnerability in Microsoft SharePoint Server has been published on GitHub. The flaw is known as CVE-2023-29357.
Attackers exploiting this flaw can gain administrator privileges without any user interaction, using spoofed JWT authentication tokens to execute a network attack that bypasses authentication.
STAR Labs researcher Nguyễn Tiến Giang detailed the exploitation process to include the CVE-2023-29357 bug and a second critical flaw, CVE-2023–24955, in a recent technical analysis.
The second flaw enables remote code execution via command injection.
Nguyễn showed a successful remote code execution on Microsoft SharePoint Server using this exploit chain in March 2023, winning a $100,000 prize at the Pwn2Own contest in Vancouver.
The posted exploit on GitHub does not offer the full exploit chain for remote code execution. However, attackers may combine this exploit with the CVE-2023-24955 bug to achieve this.
Microsoft has released security patches for these flaws and network administrators are urged to apply them immediately to prevent attacks.