CVE-2023-38177: Microsoft SharePoint Server Remote Code Execution Vulnerability

Overview

Severity
Medium (CVSS 6.1)
CVSS Vector
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
Category
Remote Code Execution
Exploit Status
Not Exploited
Exploitation Likelihood
More Likely
Patch Tuesday
2023-Nov
Released
2023-11-14
EPSS Score
0.18% (percentile: 40.3%)

FAQ

How could an attacker exploit the vulnerability? An attacker could exploit the vulnerability by exploiting vulnerable APIs through a deserialization of unsafe data input vulnerability. Exploitation of this vulnerability requires that a user access a susceptible API on an affected version of SharePoint with a specially-formatted input file resulting in possible remote code execution on the SharePoint Server. How could an attacker exploit this vulnerability? In a network-based attack, an authenticated attacker could execute code remotely within the SharePoint Server.

Affected Products (3)

Microsoft Office

  • Microsoft SharePoint Enterprise Server 2016
  • Microsoft SharePoint Server 2019
  • Microsoft SharePoint Server Subscription Edition

Security Updates (3)

Acknowledgments

Anonymous

Revision History

  • 2023-11-14: Information published.