CVE-2023-24955
vulnerability analysis and mitigation

Overview

Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2023-24955) is a critical security flaw that was patched in May 2023. The vulnerability allows an authenticated Site Owner to execute code on an affected SharePoint Server. This vulnerability has been assigned a CVSSv3 score of 7.2 HIGH (Microsoft MSRC). The vulnerability affects multiple versions of SharePoint Server including SharePoint Enterprise Server 2016, SharePoint Server Subscription Edition, and SharePoint Server 2019 (NVD).

Technical details

CVE-2023-24955 is a code injection vulnerability that can be chained with CVE-2023-29357 (an authentication bypass vulnerability) to achieve unauthenticated remote code execution on affected SharePoint servers. The vulnerability was demonstrated at the Zero Day Initiative's Pwn2Own contest in Vancouver in March 2023. When exploited independently, CVE-2023-24955 requires authenticated access with Site Owner privileges to achieve code execution (Tenable).

Impact

When successfully exploited, this vulnerability allows attackers to execute arbitrary code on the affected SharePoint Server. The severity is heightened when chained with CVE-2023-29357, as it enables unauthenticated remote code execution, potentially giving attackers complete control over the vulnerable system (Tenable).

Mitigation and workarounds

Microsoft has released security patches for this vulnerability as part of the May 2023 Patch Tuesday updates. Organizations are strongly advised to apply these patches as soon as possible to protect against potential exploitation. The vulnerability affects SharePoint Enterprise Server 2016, SharePoint Server Subscription Edition, and SharePoint Server 2019 (NVD).

Community reactions

The vulnerability gained significant attention after being successfully exploited during the Pwn2Own Vancouver 2023 contest by STAR Labs researcher Nguyễn Tiến Giang (Jang). The researcher spent nearly a year developing the exploit chain that combines this vulnerability with CVE-2023-29357 (Tenable).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management