SharePoint Deserialization of Untrusted Data Vulnerability

漏洞信息

漏洞名称: SharePoint Deserialization of Untrusted Data Vulnerability

漏洞编号:

  • CVE: CVE-2025-53770

漏洞类型: 反序列化

漏洞等级: 严重

漏洞描述: 受影响产品: SharePoint Server是微软推出的一款企业级协作平台,广泛应用于企业内部文档管理、团队协作和业务流程自动化。它通常部署在企业内网中,作为核心的协作和内容管理解决方案。此次漏洞影响SharePoint Server 2016、2019及订阅版,而SharePoint Online(Microsoft 365)不受影响。

漏洞解释: 此漏洞属于反序列化漏洞,具体为对不可信数据的反序列化处理不当。攻击者可以利用此漏洞在未认证的情况下执行远程代码(RCE),窃取ASP.NET MachineKeys,伪造可信的__VIEWSTATE负载,甚至在打补丁后仍保持持久性。漏洞的技术根源在于SharePoint Server在处理某些数据时未进行充分的验证和清理,导致恶意构造的数据可以被反序列化并执行。

影响分析: 此漏洞的安全风险极高,CVSS评分为9.8。攻击者无需认证即可利用此漏洞执行任意代码,完全控制受影响的SharePoint环境。此外,攻击者还可以窃取MachineKeys,用于伪造身份或加密数据,进一步扩大攻击范围。由于漏洞允许在登录前执行代码,且可以持久化,因此对企业的内部网络和数据安全构成严重威胁。企业需要立即采取措施检测和修复此漏洞,以防止潜在的大规模安全事件。

产品厂商: Microsoft

产品名称: SharePoint Server

影响版本: 2016, 2019, Subscription Edition

来源: https://github.com/Bluefire-Redteam-Cybersecurity/bluefire-sharepoint-cve-2025-53770

类型: CVE-2025:github search

仓库文件

  • LICENSE
  • README.md

来源概述

🔐 Bluefire Redteam – SharePoint CVE-2025-53770 Detection & Remediation Toolkit

This open-source toolkit provides security teams with battle-tested scripts to detect, assess, and remediate the critical SharePoint zero-day vulnerability CVE-2025-53770 (CVSS 9.8) — currently being exploited in the wild.

Maintained by Bluefire Redteam, a global offensive security firm.


⚠️ About CVE-2025-53770

  • Vulnerability: Deserialization of untrusted data in on-prem SharePoint Server
  • Impact: Unauthenticated Remote Code Execution (RCE), MachineKey theft, persistent compromise
  • Affected: SharePoint Server 2016, 2019, Subscription Edition
  • Not affected: SharePoint Online (Microsoft 365)

Once exploited, attackers can:

  • Execute code before login
  • Steal ASP.NET MachineKeys
  • Forge trusted __VIEWSTATE payloads
  • Remain persistent even after patching

🔍 Usage Instructions

✅ Step 1: Clone the Repository

1
2
git clone https://github.com/bluefireredteam/bluefire-sharepoint-cve-2025-53770.git
cd bluefire-sharepoint-cve-2025-53770

🧪 Step 2: Run the Detection Script on Windows

1
.\scripts\detect-vulnerability.ps1

This script:

  • Detects installed SharePoint version and checks if it’s vulnerable
  • Checks if the latest patches are installed (KB5002754 / KB5002768)
  • Verifies if AMSI is enabled
  • Scans for known Indicators of Compromise (e.g., spinstall0.aspx, encoded PowerShell, suspicious w3wp.exe behavior)

🛡️ Step 3: Run the Remediation Script (If Vulnerable)

1
.\scripts\remediate-vulnerability.ps1

This script:

  • Verifies patch presence
  • Enables Antimalware Scan Interface (AMSI)
  • Rotates SharePoint ASP.NET MachineKeys
  • Restarts IIS services

🐧 Step 4: Run the Linux Hybrid Scan (Optional)

1
bash ./scripts/hybrid-ioc-scan.sh

Useful for:

  • Reverse proxies, DMZ servers, or shared Linux environments connected to vulnerable SharePoint instances
  • Scanning for dropped payloads, encoded PowerShell, or lateral movement behavior

🙋‍♂️ Support / Consulting

Need help analyzing your environment or running this toolkit at scale?

🔗 Contact Bluefire Redteam


📄 License

This project is licensed under the MIT License.


⭐️ Why This Matters

SharePoint sits at the core of many enterprise intranets, workflows, and DevOps pipelines. CVE-2025-53770 allows unauthenticated attackers to take full control of these environments with minimal friction. This toolkit gives defenders a reliable first line of defense — backed by a red team’s real-world testing.


SharePoint Deserialization of Untrusted Data Vulnerability
http://example.com/2025/07/21/github_254105332/
作者
lianccc
发布于
2025年7月21日
许可协议