POC详情: 8c8d470a02fdbd42725d870534683e01c17cc207

来源
关联漏洞
标题: Microsoft SharePoint 安全漏洞 (CVE-2023-29357)
描述:Microsoft SharePoint是美国微软(Microsoft)公司的一套企业业务协作平台。该平台用于对业务信息进行整合,并能够共享工作、与他人协同工作、组织项目和工作组、搜索人员和信息。 Microsoft Office SharePoint存在安全漏洞。攻击者利用该漏洞可以提升权限。
介绍
# SOC227 - Microsoft SharePoint Server Elevation of Privilege (CVE-2023-29357 Exploitation)

**CVE-2023-29357** is a critical privilege escalation vulnerability that, when combined with other vulnerabilities, could potentially lead to remote code execution. The CVSS score for this vulnerability is **9.8 (Critical)**.

---

## Event Information

<img src="https://i.imgur.com/91OG0jL.png" width="800">

-  **EventID**: 189

- **Event Time**: Oct 06, 2023, 08:05 PM
  
- **Rule**: SOC227 - Microsoft SharePoint Server Elevation of Privilege - Possible CVE-2023-29357 Exploitation
  
- **Level**: Security Analyst
  
- **Hostname**: MS-SharePointServer
  
- **Destination IP Address**: 172.16.17.233
  
- **Source IP Address**: 39.91.166.222
  
- **HTTP Request Method**: GET
  
- **Requested URL**: /api/web/siteusers
  
- **User-Agent**: python-requests/2.28.1
  
- **Alert Trigger Reason**: This activity may indicate an attempt to exploit CVE-2023-29357, potentially leading to unauthorized access and privilege escalation within the SharePoint server.

---

## Investigation Process

We began by focusing on the following key areas:

1. **Log Management**
2. **Endpoint Security**

### Log Management

The **source IP address** that triggered the alert was flagged by our firewall **3 times**. Upon further inspection of the logs:
- **Event 1**: The GET request returned a **HTTP 404** status (Not Found).

<img src="https://i.imgur.com/hNu7lRI.png" width="800"> 
  
- **Event 2 & 3**: Both returned **HTTP 200** statuses, indicating that the attacker successfully received the requested response.

<img src="https://i.imgur.com/2htYXj2.png" width="800">

<img src="https://i.imgur.com/71GUZbx.png" width="800">

### Endpoint Security Investigation

We connected to the **MS-SharePointServer** device and found no relevant information in the browser or terminal history. We then analyzed the system processes and identified several concerning ones.

<img src="https://i.imgur.com/uds8oKD.png" width="800">

---

## Process Analysis

### 1. **svchost.exe**

- **Command**: `C:\Windows\System32\svchost.exe -k termsvcs -s TermService`
- **Explanation**:
  - **svchost.exe** is the Service Host Process, which runs Windows services.
  - **-k termsvcs** specifies that this instance is hosting the **Terminal Services** group.
  - **-s TermService** starts the **Remote Desktop Services**.

### 2. **MpCmdRun.exe**

- **Command**: `"C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\MpCmdRun.exe" SignaturesUpdateService -ScheduleJob -UnmanagedUpdate`
- **Explanation**:
  - **MpCmdRun.exe** is the Microsoft Defender Command-Line Utility used for Defender-related tasks.
  - **SignaturesUpdateService** performs a virus definition update.
  - **-ScheduleJob** schedules the update as a background task.
  - **-UnmanagedUpdate** forces the update even if the system isn't managed by Group Policy or Microsoft Endpoint Manager.

### 3. **svchost.exe**

- **Command**: `C:\Windows\system32\svchost.exe -k DcomLaunch -p`
- **Explanation**:
  - **svchost.exe** is hosting the **DcomLaunch** service group responsible for DCOM and COM+ services.
  - **-p** runs **svchost.exe** as a protected process to enhance security.

---

## Conclusion and Response

After reviewing the collected data, we followed the appropriate playbook steps and confirmed the traffic as **malicious**.

- **Attack Type**: Privilege escalation.
- **Planned Test**: No penetration testing was confirmed via email during the event timeframe.
- **Action Taken**: The affected device was quarantined. Further escalation to **T2** is required for additional investigation and response.

---

## Next Steps

- **Escalation**: The issue was escalated to the **T2** team for further investigation and remediation.
- **Continuous Monitoring**: We will continue to monitor for further exploitation attempts and ensure the integrity of the SharePoint server.

---

# Result: 

<img src="https://i.imgur.com/NrxCfBR.png" width="800">

**Note**: This post is part of a SOC case analysis demonstrating the detection and response to a privilege escalation vulnerability (CVE-2023-29357) within a SharePoint environment.

## Playbook Procedure: 

<img src="https://i.imgur.com/NsPuGFS.png" width="800">

<img src="https://i.imgur.com/U5iT3l4.png" width="800">

<img src="https://i.imgur.com/sYehNaf.png" width="800">

<img src="https://i.imgur.com/FT5W4ug.png" width="800">

<img src="https://i.imgur.com/o0UBrNE.png" width="800">

<img src="https://i.imgur.com/LQmWkuz.png" width="800">

<img src="https://i.imgur.com/K9OhifA.png" width="800">

<img src="https://i.imgur.com/C2FSPxs.png" width="800">

<img src="https://i.imgur.com/ddr63Ic.png" width="800">

<img src="https://i.imgur.com/53hg7xf.png" width="800">

<img src="https://i.imgur.com/s1KerXU.png" width="800">
文件快照

[4.0K] /data/pocs/8c8d470a02fdbd42725d870534683e01c17cc207 └── [4.7K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。