SharePoint Misconfiguration Vulnerability
漏洞信息
漏洞名称: SharePoint Misconfiguration Vulnerability
漏洞编号:
- CVE: CVE-2025-53770
漏洞类型: 配置问题
漏洞等级: 中危
漏洞描述: 该漏洞涉及Microsoft SharePoint的一个配置问题,允许攻击者通过发送特制的POST请求来检测目标系统是否存在特定的配置错误。SharePoint是微软提供的一个企业级协作平台,广泛应用于企业内部文档管理和团队协作。由于其广泛的应用,该漏洞可能影响大量企业用户。漏洞的技术根源在于SharePoint的某些配置未能正确限制或验证传入的请求,从而导致系统可能暴露于未授权的扫描或进一步的攻击。这种配置问题可能导致信息泄露,攻击者可以利用此漏洞识别易受攻击的系统,进而可能发起更复杂的攻击。值得注意的是,该漏洞的利用不需要认证,且可以通过自动化工具进行批量扫描,增加了其潜在的风险。
产品厂商: Microsoft
产品名称: SharePoint
来源: https://github.com/ZephrFish/CVE-2025-53770-Scanner
类型: CVE-2025:github search
仓库文件
- README.md
- scanner.py
来源概述
CVE-2025-53770-Scanner
This script scans a list of hosts to identify if they are vulnerable to a specific SharePoint misconfiguration by sending a crafted POST request and checking the response. By default, the script uses HTTPS. If your SharePoint servers only support HTTP, you will need to modify the script to use http:// instead.
Usage
Dump your target hosts in a text file.
1 |
|
Run the scanner with:
1 |
|
Options:
-i
: Path to input file with hosts (required).-t
: Number of concurrent threads (optional, default: 10).
Example:
1 |
|