Original Article Text

Click to Toggle View

CISA: Critical Microsoft SharePoint bug now actively exploited. CISA warns that attackers are now exploiting a critical Microsoft SharePoint privilege escalation vulnerability that can be chained with another critical bug for remote code execution. Tracked as CVE-2023-29357, the security flaw enables remote attackers to get admin privileges on unpatched servers by circumventing authentication using spoofed JWT auth tokens. "An attacker who has gained access to spoofed JWT authentication tokens can use them to execute a network attack which bypasses authentication and allows them to gain access to the privileges of an authenticated user," Microsoft explains. "An attacker who successfully exploited this vulnerability could gain administrator privileges. The attacker needs no privileges nor does the user need to perform any action." Remote attackers can also execute arbitrary code on compromised SharePoint servers via command injection when chaining this flaw with the CVE-2023-24955 SharePoint Server remote code execution vulnerability. This Microsoft SharePoint Server exploit chain was successfully demoed by STAR Labs researcher Jang (Nguyễn Tiến Giang) during last year's March 2023 Pwn2Own contest in Vancouver, earning a $100,000 reward. The researcher published a technical analysis on September 25 describing the exploitation process in detail. Just one day later, a security researcher also released a CVE-2023-29357 proof-of-concept exploit on GitHub. Even though the exploit does not grant remote code execution on targeted systems, since it's not a complete exploit for the chain demoed at Pwn2Own, its author said attackers could chain it with the CVE-2023-24955 bug themselves for RCE. "The script outputs details of admin users with elevated privileges and can operate in both single and mass exploit modes," the PoC exploit's developer says. "However, to maintain an ethical stance, this script does not contain functionalities to perform RCE and is meant solely for educational purposes and lawful and authorized testing." Since then, many other PoC exploits for this chain have surfaced online, lowering the exploitation bar and allowing even lesser-skilled threat actors to deploy it in attacks. While it has yet to provide additional details on CVE-2023-29357 active exploitation, CISA added the vulnerability to its Known Exploited Vulnerabilities Catalog and now requires U.S. federal agencies to patch it by the end of the month, on January 31.

Daily Brief Summary

CYBERCRIME // CISA Reports Active Exploitation of Critical SharePoint Vulnerability

CISA has issued an alert on the active exploitation of a critical Microsoft SharePoint vulnerability, tracked as CVE-2023-29357.

The vulnerability allows remote attackers to gain administrative privileges on unpatched SharePoint servers by using spoofed JWT authentication tokens.

It can be combined with another critical SharePoint bug, CVE-2023-24955, for remote code execution, posing a severe security risk.

The exploit chain was demonstrated at Pwn2Own 2023 by researcher Jang (Nguyễn Tiến Giang), who received a $100,000 reward.

A proof-of-concept (PoC) exploit for CVE-2023-29357 has been released on GitHub, increasing the risk of widespread exploitation by lowering the technical barrier for cybercriminals.

Following the PoC release, additional exploits have appeared online, further exacerbating the threat.

CISA has mandated U.S. federal agencies to patch this vulnerability by January 31 to mitigate the risk of exploitation.