CVE-2022-22005

8.8 HIGH

📋 TL;DR

CVE-2022-22005 is a remote code execution vulnerability in Microsoft SharePoint Server that allows authenticated attackers to execute arbitrary code on affected servers by uploading specially crafted files. This affects organizations running vulnerable SharePoint Server versions, potentially compromising entire SharePoint environments and underlying systems.

💻 Affected Systems

Products:
  • Microsoft SharePoint Server
  • Microsoft SharePoint Enterprise Server
Versions: Microsoft SharePoint Server 2013, 2016, 2019; SharePoint Enterprise Server 2016
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access. SharePoint Online is not affected. SharePoint Foundation 2013 is affected but unsupported.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of SharePoint Server leading to domain takeover, data exfiltration, ransomware deployment, and lateral movement across the network.

🟠

Likely Case

Unauthorized access to sensitive SharePoint data, installation of backdoors, and persistence within the SharePoint environment.

🟢

If Mitigated

Limited impact due to network segmentation, strict authentication requirements, and file upload restrictions preventing exploitation.

🌐 Internet-Facing: HIGH - SharePoint servers exposed to the internet are directly accessible to attackers who can exploit this vulnerability after obtaining valid credentials.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts can exploit this vulnerability, but requires initial access to the internal network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to SharePoint. Multiple proof-of-concept exploits have been published demonstrating file upload to RCE techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2022 security updates for SharePoint Server

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22005

Restart Required: Yes

Instructions:

1. Apply July 2022 security updates for SharePoint Server from Microsoft Update. 2. Restart SharePoint servers. 3. Verify patch installation via Control Panel > Programs > View installed updates.

🔧 Temporary Workarounds

Restrict file upload capabilities

all

Limit file upload permissions to trusted users only and implement file type restrictions

Implement web application firewall rules

all

Block suspicious file upload patterns and restrict access to SharePoint upload endpoints

🧯 If You Can't Patch

  • Isolate SharePoint servers from critical network segments using firewall rules
  • Implement strict access controls and monitor for suspicious file upload activities

🔍 How to Verify

Check if Vulnerable:

Check SharePoint Server version and compare against patched versions. Vulnerable if running SharePoint Server 2013/2016/2019 without July 2022 security updates.

Check Version:

Get-SPFarm | Select BuildVersion (PowerShell) or check Central Administration > Upgrade and Migration > Check product and patch installation status

Verify Fix Applied:

Verify July 2022 security updates are installed via Control Panel > Programs > View installed updates. Look for KB5015870 (SharePoint Server 2019), KB5015871 (SharePoint Server 2016), or KB5015872 (SharePoint Server 2013).

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to SharePoint, particularly with suspicious extensions or from unexpected users
  • Failed authentication attempts followed by successful logins and file uploads
  • Execution of unexpected processes from SharePoint application pool

Network Indicators:

  • Unusual outbound connections from SharePoint servers, particularly to command and control infrastructure
  • Spikes in upload traffic to SharePoint endpoints

SIEM Query:

source="sharepoint_logs" AND (event="FileUpload" AND file_extension IN ("aspx", "ashx", "asmx") OR process_execution FROM "w3wp.exe")

🔗 References

📤 Share & Export