CVE-2021-36940

7.6 HIGH

📋 TL;DR

This vulnerability allows an authenticated attacker to spoof content in Microsoft SharePoint Server, potentially tricking users into interacting with malicious content. It affects organizations running vulnerable SharePoint Server versions. The attacker must have authenticated access to SharePoint to exploit this vulnerability.

💻 Affected Systems

Products:
  • Microsoft SharePoint Server
Versions: Microsoft SharePoint Server 2019, Microsoft SharePoint Server 2016, Microsoft SharePoint Server 2013 Service Pack 1
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability requires authenticated access to SharePoint. All default configurations of affected SharePoint versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could spoof legitimate SharePoint content to trick users into revealing credentials, downloading malware, or performing unauthorized actions while appearing to interact with trusted SharePoint resources.

🟠

Likely Case

Phishing attacks within SharePoint where attackers create convincing spoofed pages to harvest credentials or distribute malware to authenticated users.

🟢

If Mitigated

With proper access controls and user awareness training, the impact is limited to potential confusion or minor social engineering attempts within the SharePoint environment.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to SharePoint. The spoofing technique is relatively straightforward once an attacker has valid credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security updates released in August 2021 for SharePoint Server 2019, 2016, and 2013 SP1

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36940

Restart Required: Yes

Instructions:

1. Download the appropriate security update from Microsoft Update Catalog. 2. Apply the update to all affected SharePoint servers. 3. Restart the SharePoint servers as required. 4. Test SharePoint functionality after patching.

🔧 Temporary Workarounds

Restrict SharePoint Access

all

Limit SharePoint access to only necessary users and implement principle of least privilege.

User Awareness Training

all

Train users to verify SharePoint URLs and be cautious of unexpected content changes.

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unusual SharePoint content modifications
  • Deploy web application firewall rules to detect and block spoofing attempts

🔍 How to Verify

Check if Vulnerable:

Check SharePoint Server version and compare against patched versions. Vulnerable versions include SharePoint Server 2019, 2016, and 2013 SP1 without August 2021 security updates.

Check Version:

Get-SPFarm | Select BuildVersion (PowerShell on SharePoint server)

Verify Fix Applied:

Verify that August 2021 security updates for SharePoint are installed and check that spoofing attempts are no longer successful.

📡 Detection & Monitoring

Log Indicators:

  • Unusual content creation/modification patterns in SharePoint logs
  • Multiple failed authentication attempts followed by content changes

Network Indicators:

  • Unusual traffic patterns to SharePoint content pages
  • Requests that appear to manipulate SharePoint content parameters

SIEM Query:

source="SharePoint" AND (event_type="content_modified" OR event_type="page_created") AND user NOT IN [authorized_users]

🔗 References

📤 Share & Export