CVE-2023-29375

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload dangerous files through the SharePoint connector in Progress Sitefinity CMS. It affects all Sitefinity installations using vulnerable versions, potentially leading to remote code execution or system compromise.

💻 Affected Systems

Products:
  • Progress Sitefinity CMS
Versions: Sitefinity 13.3 before 13.3.7647, 14.0 before 14.0.7736, 14.1 before 14.1.7826, 14.2 before 14.2.7930, and 14.3 before 14.3.8025
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires SharePoint connector to be enabled and configured.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Malicious file upload leading to web shell installation and persistent backdoor access.

🟢

If Mitigated

File upload attempts blocked or logged with no successful exploitation.

🌐 Internet-Facing: HIGH - SharePoint connectors are often exposed to external users for collaboration.
🏢 Internal Only: MEDIUM - Internal users could still exploit if they have SharePoint access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires SharePoint connector access but no authentication bypass needed for file upload functionality.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Sitefinity 13.3.7647, 14.0.7736, 14.1.7826, 14.2.7930, or 14.3.8025

Vendor Advisory: https://community.progress.com/s/article/Sitefinity-Security-Advisory-for-Addressing-Security-Vulnerabilities-April-2023

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Progress support portal. 2. Backup your Sitefinity installation. 3. Apply the patch according to Progress documentation. 4. Restart the application server. 5. Verify the patch was applied successfully.

🔧 Temporary Workarounds

Disable SharePoint Connector

all

Temporarily disable the SharePoint connector feature if not essential.

Navigate to Administration > Modules & Services > SharePoint Connector > Disable

Restrict File Upload Types

all

Configure SharePoint connector to only allow specific safe file types.

Modify SharePoint connector configuration to restrict allowed file extensions

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SharePoint connector traffic
  • Deploy web application firewall with file upload protection rules

🔍 How to Verify

Check if Vulnerable:

Check Sitefinity version in Administration > About. Compare against affected versions list.

Check Version:

Check Sitefinity version in web interface or examine web.config file version tag

Verify Fix Applied:

Verify version number matches patched versions after applying update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads through SharePoint connector
  • ASPX/PHP/executable files uploaded via SharePoint

Network Indicators:

  • HTTP POST requests to SharePoint connector endpoints with unusual file extensions

SIEM Query:

source="sitefinity_logs" AND (event="file_upload" OR event="sharepoint_upload") AND file_extension IN ("aspx", "php", "exe", "dll")

🔗 References

📤 Share & Export