Skip to content

Microsoft SharePoint Server Elevation of Privilege Vulnerability

Notifications You must be signed in to change notification settings

Chocapikk/CVE-2023-29357

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

🛑 Microsoft SharePoint: CVE-2023-29357 🛑

Microsoft SharePoint Server Elevation of Privilege Vulnerability

📌 Summary:

This script exploits a vulnerability (CVE-2023-29357) in Microsoft SharePoint Server allowing remote attackers to escalate privileges on affected installations of Microsoft SharePoint Server. While this script focuses on elevation of privilege, attackers with malicious intent might chain this vulnerability with a Remote Code Execution (RCE) vulnerability (CVE-2023–24955) to compromise the integrity, availability, and confidentiality of the target system.

📖 Description:

The exploit script facilitates the impersonation of authenticated users, allowing attackers to execute arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account, potentially causing a denial of service (DoS). The script outputs details of admin users with elevated privileges and can operate in both single and mass exploit modes. However, to maintain an ethical stance, this script does not contain functionalities to perform RCE and is meant solely for educational purposes and lawful and authorized testing.

🚀 Usage:

Prerequisites:

  • Python 3.8 or above
  • Install the necessary Python packages:
    pip install -r requirements.txt

Script Execution:

  1. Single URL

    python3.10 exploit.py -u <Target SharePoint URL> [-v]

    -v is an optional parameter to run the script in verbose mode.

  2. List of URLs

    python3.10 exploit.py -l <file-containing-SharePoint-URLs> [-v]

    -l specifies a file containing a list of SharePoint URLs.

  3. Usage with LeakIX

    To utilize this script with LeakIX, please note that this feature is only accessible to LeakIX Pro API key holders as it relies on the SharePointPlugin which is private. You can run the following command:

    python3.10 exploit.py --leakpy (--bulk | --pages=<number_of_pages>) [-v]
    • You can use either --bulk without a value or --pages=<number_of_pages>, but not both.
    • Use --pages with a value, up to a maximum of 500, to specify the number of pages.
    • Add the -v flag for verbose output.

    Note: Using --leakpy triggers the mass exploit mode, fetching URLs from LeakIX. Keep in mind, using --leakpy, --bulk, and --pages are contingent upon possession of a Pro API key from LeakIX.

📎 Parameters:

  • -u, --url <URL>: Specifies a single SharePoint URL.
  • -l, --list <file>: Specifies a file containing a list of SharePoint URLs.
  • --leakpy: Enables mass exploit mode, fetching URLs from LeakIX.
  • --bulk <bulk_size>: Specifies the bulk size when using LeakIX.
  • --pages <number_of_pages>: Specifies the number of pages to fetch from LeakIX.
  • -v, --verbose: Enables verbose mode.
  • -o, --output <output_file>: Specifies a file to output vulnerable URLs.

📄 Output:

The script will output the details of each admin user found with 'IsSiteAdmin' set to true, along with their Title, Email, NameId, and NameIdIssuer. If you are in mass exploit mode (args.leakpy or args.list), it will run through each URL without executing the spoofing function and output any vulnerable URLs to the specified output file.

⚠️ Disclaimer:

IMPORTANT: This script is provided for educational, ethical testing, and lawful use ONLY. Do not use it on any system or network without explicit permission. Unauthorized access to computer systems and networks is illegal, and users caught performing unauthorized activities are subject to legal actions. The author is NOT responsible for any damage caused by the misuse of this script.

About

Microsoft SharePoint Server Elevation of Privilege Vulnerability

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages