Cyber Security News

Microsoft SharePoint Server Vulnerabilities Chained to Achieve Remote Code Execution

Microsoft SharePoint Server was reported with two vulnerabilities, CVE-2023-29357 and CVE-2023-24955, which threat actors can use for achieving remote code execution (RCE) against Microsoft SharePoint Server.

These vulnerabilities were discovered as part of the Zero Day Initiative’s Pwn2Own contest conducted in March 2023. The STAR labs team was able to find this vulnerability and were rewarded $100,000 for their finding.

However, security researcher Nguyễn Tiến Giang published a GitHub repository containing the proof-of-concept (PoC) for the exploit chain, which could chain these two vulnerabilities to achieve successful remote command execution.

Document
FREE Demo

Deploy Advanced AI-Powered Email Security Solution

Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware

CVE-2023-29357 & CVE-2023-24955 – Technical Analysis

CVE-2023-29357 was a Privilege Escalation vulnerability that existed on the Microsoft SharePoint Server, which threat actors can exploit by sending a spoofed JWT (JSON Web Token) authentication token to the Microsoft SharePoint Server, which could elevate their privileges. This vulnerability had a severity of 9.8 (Critical). 

CVE-2023-24955 was a Remote Command Execution vulnerability affecting the same Microsoft SharePoint Server and had a severity of 7.2 (High). Microsoft patched both of these vulnerabilities as part of their May and June security patches.

Exploit Chain

After conducting several research for over a year, security researcher Jang combined the authentication bypass vulnerability with the code injection vulnerability, which resulted in an unauthenticated RCE on the Microsoft SharePoint Server. A Proof-of-concept video was also published, which demonstrated the attack and exploitation. 

Additionally, it was worth noting that the security researchers made sure that the publicly available proof-of-concept does not achieve unauthenticated RCE, as threat actors can indulge in various malicious activities with a publicly available exploit.

Users of the Microsoft SharePoint server are recommended to patch these vulnerabilities by following the Microsoft Security patch released every second Tuesday of every month.

Protect yourself from vulnerabilities using Patch Manager Plus to quickly patch over 850 third-party applications. Take advantage of the free trial to ensure 100% security.

Eswar

Eswar is a Cyber security reporter with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is reporting data breach, Privacy and APT Threats.

Recent Posts

DragonForce and Anubis Ransomware Operators Unveils New Affiliate Models

Despite significant disruptions by international law enforcement operations targeting major ransomware schemes, cybercriminal groups continue…

14 hours ago

New Power Parasites Phishing Attack Targeting Energy Companies and Major Brands

A sophisticated phishing campaign dubbed "Power Parasites" has been actively targeting global energy giants and…

14 hours ago

Social Engineering Awareness: How CISOs And SOC Heads Can Protect The Organization

Social engineering has become the dominant attack vector in the modern cybersecurity landscape. As technical…

16 hours ago

XDR In Penetration Testing: Leveraging Advanced Detection To Find Vulnerabilities

Extended Detection and Response (XDR) has emerged as a transformative security technology that unifies visibility…

17 hours ago

How To Build A Data Center Security Strategy For 2025 And Beyond

As the world becomes increasingly reliant on digital infrastructure, data centers have evolved into the…

17 hours ago

Top 5 Cybersecurity Risks CISOs Must Tackle in 2025

As we navigate 2025, Chief Information Security Officers (CISOs) must prepare for the Top 5…

21 hours ago