Microsoft SharePoint Server Privilege Escalation Vulnerability — Microsoft SharePoint Server contains an unspecified vulnerability that allows an unauthenticated attacker, who has gained access to spoofed JWT authentication tokens, to use them for executing a network attack. This attack bypasses authentication, enabling the attacker to gain administrator privileges.
CVE-2023-29357 is a critical privilege escalation vulnerability in Microsoft SharePoint Server (CVSS 9.0) that allows unauthenticated attackers with spoofed JWT tokens to bypass authentication and gain administrator privileges. With public exploits available, this poses an immediate threat to organizations using SharePoint for document management and collaboration. Immediate patching is essential as the vulnerability enables complete compromise of SharePoint infrastructure and sensitive data access.
IMMEDIATE ACTIONS:
1. Apply Microsoft security patches immediately to all SharePoint Server instances (2019, 2016, 2013 versions as applicable)
2. Disable SharePoint services temporarily if patching cannot be completed within 24 hours
3. Implement network segmentation to restrict SharePoint access to authorized networks only
4. Revoke and regenerate all JWT tokens and authentication credentials
5. Force re-authentication for all active SharePoint sessions
PATCHING GUIDANCE:
- Download latest cumulative updates from Microsoft Security Updates
- Test patches in non-production environment first
- Schedule maintenance windows for production deployment
- Verify patch installation with Microsoft's verification tools
COMPENSATING CONTROLS (if immediate patching delayed):
- Implement Web Application Firewall (WAF) rules to block suspicious JWT patterns
- Enable enhanced logging for all SharePoint authentication attempts
- Deploy intrusion detection signatures for CVE-2023-29357 exploitation attempts
- Restrict SharePoint access via IP whitelisting to known corporate networks
- Monitor for unusual privilege escalation activities in SharePoint audit logs
DETECTION RULES:
- Alert on failed authentication followed by successful admin-level operations
- Monitor for JWT token validation failures and subsequent access grants
- Track unusual administrative actions from non-administrative user accounts
- Log all authentication bypass attempts in SharePoint ULS logs
الإجراءات الفورية:
1. تطبيق تصحيحات أمان Microsoft على جميع خوادم SharePoint فوراً (الإصدارات 2019 و2016 و2013)
2. تعطيل خدمات SharePoint مؤقتاً إذا لم يتم التصحيح خلال 24 ساعة
3. تنفيذ تقسيم الشبكة لتقييد الوصول إلى الشبكات المصرح بها فقط
4. إلغاء وإعادة توليد جميع رموز JWT بيانات الاعتماد
5. فرض إعادة المصادقة لجميع جلسات SharePoint النشطة
إرشادات التصحيح:
- تحميل أحدث التحديثات التراكمية من Microsoft
- اختبار التصحيحات في بيئة غير الإنتاج أولاً
- جدولة نوافذ الصيانة لنشر الإنتاج
- التحقق من تثبيت التصحيح باستخدام أدوات Microsoft
الضوابط البديلة:
- تنفيذ قواعد جدار حماية تطبيقات الويب لحجب أنماط JWT المريبة
- تفعيل السجلات المحسنة لجميع محاولات المصادقة
- نشر توقيعات الكشف عن الاستغلال
- تقييد الوصول عبر القائمة البيضاء للعناوين
- مراقبة الأنشطة الإدارية غير العادية