CVE-2023-33132
vulnerability analysis and mitigation

Overview

Microsoft SharePoint Server Spoofing Vulnerability (CVE-2023-33132) was disclosed on June 13, 2023, affecting SharePoint Server 2019 and SharePoint Server Subscription Edition. The vulnerability was identified and reported to Microsoft, who subsequently released security updates to address this issue (Microsoft Update).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 6.3 (Medium) with the following vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N. Microsoft has classified this as a spoofing vulnerability, and it has been associated with CWE-79 (Improper Neutralization of Input During Web Page Generation - Cross-site Scripting) (NVD Database).

Impact

The vulnerability could potentially allow an attacker to perform spoofing attacks against SharePoint Server installations. Given the CVSS scoring, it indicates that the vulnerability could lead to high confidentiality impact and low integrity impact, with no availability impact (Microsoft Update).

Mitigation and workarounds

Microsoft has released security updates to address this vulnerability. For SharePoint Server 2019, the fix is included in KB5002402, and for SharePoint Server Subscription Edition, it's included in KB5002416. Users are advised to apply these security updates through Microsoft Update, Microsoft Update Catalog, or Microsoft Download Center (Microsoft Support).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management