SOC227 - Microsoft SharePoint Server Elevation of Privilege CVE-2023-29357 Walkthrough


This case covers an alert triggered by a potential exploitation of CVE-2023-29357, a critical Microsoft SharePoint Server Elevation of Privilege vulnerability. The investigation confirms the traffic was malicious and successful in exploiting the system.


Alert Details

FieldValue
Event ID189
Event TimeOctober 6, 2023, 08:05 PM
RuleSOC227 - SharePoint Server Elevation of Privilege (CVE-2023-29357)
LevelSecurity Analyst
HostnameMS-SharePointServer
Destination IP172.16.17.233
Source IP39.91.166.222
HTTP MethodGET
Requested URL/api/web/siteusers
User-Agentpython-requests/2.28.1
Alert Trigger ReasonPotential exploitation attempt of CVE-2023-29357

Initial Investigation

I began the investigation by analyzing the source IP address: 39.91.166.222. Threat intelligence tools, including VirusTotal, flagged this IP as malicious.

Pasted-image-20250705181855.png

HTTP Traffic Review

Using the Log Management page, I examined the HTTP requests that were permitted:

Pasted-image-20250705183023.png

Request URLUser-AgentMethodDevice ActionHTTP StatusResponse Size
/api/web/siteusers/web/siteuserspython-requests/2.28.1GETPermitted4041453
/api/web/currentuserpython-requests/2.28.1GETPermitted2001071
/api/web/siteuserspython-requests/2.28.1GETPermitted2001453

Starting The Playbook

With this context in place, I proceeded to create a case and start the playbook to begin structured incident response.

Pasted-image-20250705183612.png

Understand Why the Alert Was Triggered

To begin the investigation, we first examine the rule name and the involved network traffic to better understand the nature of the alert.

Rule Name:

SOC227 - Microsoft SharePoint Server Elevation of Privilege - Possible CVE-2023-29357 Exploitation

This rule detects possible exploitation of CVE-2023-29357, a critical privilege escalation vulnerability in Microsoft SharePoint. Attackers exploiting this flaw could gain elevated privileges on the target server and potentially execute additional payloads in combination with other vulnerabilities.

Traffic Details:

  • Source IP: 39.91.166.222

  • Destination IP: 172.16.17.233

  • Hostname: MS-SharePointServer

  • HTTP Method: GET

  • Requested URL: /api/web/siteusers

  • User-Agent: python-requests/2.28.1

The request appears to be automated, likely generated by a script attempting to interact with SharePoint’s REST API, which is not typical behavior for normal user activity.

Collect Data

Next, we gather relevant context around the internal asset and external IP address to better understand the source and intent of the traffic.

Internal Device:

  • Hostname: MS-SharePointServer

  • IP Address: 172.16.17.233

External IP Address:

  • Source IP: 39.91.166.222

  • Ownership: China Unicom Shandong Province

  • Netname: UNICOM-SD

  • Country: CN

  • ASN: AS4837 – CHINA UNICOM China169 Backbone

  • Whois Link: https://rdap.apnic.net/ip/39.64.0.0/11

Pasted-image-20250705182001.png

These indicators strongly suggest the traffic is external, automated, and likely malicious.

Examine HTTP Traffic

We reviewed the HTTP request logs associated with the alert, noting the following key details:

Request URLUser-AgentMethodDevice ActionResponse StatusResponse Size
/_api/web/siteusers/web/siteuserspython-requests/2.28.1GETPermitted4041453
/_api/web/currentuserpython-requests/2.28.1GETPermitted2001071
/_api/web/siteuserspython-requests/2.28.1GETPermitted2001453

The requests were all allowed by the device and used the same scripted User-Agent. The 404 response indicates some endpoints do not exist, while the 200 responses confirm successful requests to valid SharePoint REST API endpoints.

No obvious malicious payloads or injection attempts were visible in the request fields.

Is Traffic Malicious?

The external IP made scripted GET requests to SharePoint API endpoints. The activity matches attempts to exploit CVE-2023-29357.

Conclusion: The traffic is malicious.

Is There Different Traffic?

We checked for other traffic from the source IP 39.91.166.222. All requests observed were similar scripted GETs targeting SharePoint API endpoints, with no other types of traffic detected.

Conclusion: No different traffic found.

What Is The Attack Type?

The attack type is Other, specifically an elevation of privilege exploit via the SharePoint API (CVE-2023-29357).

Check If It Is a Planned Test

We searched email logs and device hostnames for any indication of planned testing or attack simulation. We found no emails referencing penetration tests or scans involving MS-SharePointServer or IP 39.91.166.222 were found.

Conclusion: The malicious traffic is not from a planned test.

What Is the Direction of Traffic?

39.91.166.222 → 172.16.17.233

The traffic flows from the external attacker IP to the internal SharePoint server.

Conclusion: Internet -> Company Network

Was the Attack Successful?

No. There is no clear evidence of successful exploitation, malicious process execution, or suspicious outbound connections.

Containment

Since the device is suspected to be compromised, it must be isolated to prevent further impact.

Using the Endpoint Security page, we selected the Containment option to isolate the MS-SharePointServer device.

This action restricts the attacker’s access and helps prevent lateral movement within the network.

Pasted-image-20250705190337.png

Add Artifacts

We added key indicators from the investigation as artifacts for further reference, including:

  • Malicious IP: 39.91.166.222

  • Affected Host: 172.16.17.233

These artifacts help track and correlate related events across security tools.

Pasted-image-20250705190603.png

Tier 2 Escalation

Based on the investigation, the attack was successful, with confirmed malicious activity targeting the internal SharePoint server. Since the attacker compromised an internal device from an external source, escalation to Tier 2 support is required.

This allows more experienced analysts to perform advanced analysis and coordinate remediation efforts. Following institutional procedures, the case has been escalated accordingly to ensure proper handling and resolution.

Analyst Note

Next, we will fill out the Analyst Note section.

Pasted-image-20250705191031.png

Finish Playbook

Finally we will click Confirm to finish the playbook.

Pasted-image-20250705191131.png

Close Alert

Lastly, we’ll return to the Investigation Channel and click the checkmark icon to officially close out the alert. For this section leave a short note summarizing the alert and in this case the alert was a true positive.

Pasted-image-20250705191304.png


Key Takeaways

This alert was a true positive involving a likely successful exploitation of CVE-2023-29357 against a Microsoft SharePoint Server. The attack originated from a known malicious IP in China, using automated API requests. The affected server was contained, relevant IOCs were documented, and the case was escalated to Tier 2 for further analysis and remediation.