Microsoft SharePoint Server 远程代码执行漏洞
漏洞信息
漏洞名称: Microsoft SharePoint Server 远程代码执行漏洞
漏洞编号:
- CVE: CVE-2025-53770
漏洞类型: 命令执行
漏洞等级: 严重
漏洞描述: ### 受影响产品
Microsoft SharePoint Server是一款广泛使用的企业级协作平台,支持文档管理、内容管理、社交网络等功能,通常部署在企业内部或云端,用于团队协作和信息共享。由于其广泛的应用,任何安全漏洞都可能对大量企业造成严重影响。
漏洞解释
此漏洞为远程代码执行(RCE)类型,攻击者可以利用此漏洞在未授权的情况下,通过构造恶意的请求在目标服务器上执行任意代码。漏洞的技术根源在于Microsoft SharePoint Server在处理某些输入时存在反序列化或欺骗活动的问题,导致攻击者能够绕过安全限制执行恶意代码。
影响分析
此漏洞的CVSS评分为9.8(严重),表明其潜在的安全风险极高。攻击者可以利用此漏洞远程执行任意代码,可能导致服务器被完全控制、数据泄露、服务中断等严重后果。由于这是一个零日漏洞,且在脚本发布时尚未有官方补丁,因此攻击者可能已经在积极利用此漏洞进行攻击。此漏洞的利用不需要用户交互,可以自动化执行,增加了其危害性。
产品厂商: Microsoft
产品名称: Microsoft SharePoint Server
来源: https://github.com/n1chr0x/ZeroPoint
类型: CVE-2025:github search
仓库文件
- LICENSE
- README.md
- ZeroPoint.ps1
- Zeropoint.png
来源概述
ZeroPoint.ps1
⚠ A defensive PowerShell utility to detect and mitigate exploitation of the CVE-2025-53770 zero-day vulnerability in Microsoft SharePoint Server.
🔍 What it Does
This PowerShell script is designed to:
- Detect compromise indicators, such as suspicious .aspx webshells
- Parse ULS logs to identify deserialization/spoofing activity
- Verify critical security settings like AMSI and Microsoft Defender
- Provide optional emergency mitigation to disconnect external interfaces
🚨 CVE Details
- CVE: CVE-2025-53770
- Type: Remote Code Execution (RCE)
- CVSS Score: 9.8 (Critical)
- Affected: Microsoft SharePoint Server (on-premises)
- Status: Zero-day actively exploited, no official patch at time of script release
👨💻 Authors
- @n1chr0x
- @BlackRazer67
🧰 Usage
🔸 Run the script on your SharePoint server:
- Open PowerShell as Administrator
- Navigate to the script directory.
- Run “powershell -ep bypass”
- Run the script “.\ZeroPoint.ps1”
✨ Features
- Clean CLI output
- Easily auditable
- Safe for production — does not exploit or modify SharePoint
- Compatible with:
- Windows Server 2016+
- SharePoint Server 2016 / 2019 / Subscription Edition