SharePoint Server Remote Code Execution Vulnerability

漏洞信息

漏洞名称: SharePoint Server Remote Code Execution Vulnerability

漏洞编号:

  • CVE: CVE-2025-53770

漏洞类型: 反序列化

漏洞等级: 严重

漏洞描述: 受影响产品: Microsoft SharePoint Server是一款广泛使用的企业级协作平台,支持文档管理、团队协作和业务流程自动化。它通常部署在企业内部网络中,用于支持内部和外部协作。此次漏洞影响的版本包括SharePoint Server 2016、2019以及订阅版,这些版本在全球范围内被广泛使用。

漏洞解释: 该漏洞被标识为CVE-2025-53770,涉及反序列化漏洞,允许未经认证的远程代码执行(RCE)。攻击者可以通过伪造HTTP头绕过认证(CVE-2025-53771),上传恶意的ASPX网页壳(spinstall0.aspx),从web.config中提取加密秘密,以及利用ViewState的不安全反序列化来远程执行代码。这种漏洞的存在主要是因为输入验证不充分和不安全的反序列化操作。

影响分析: 此漏洞的安全风险极高,攻击者可以在不需要任何认证的情况下远程执行任意代码,导致服务器被完全控制。此外,攻击者还可以窃取敏感信息,如加密密钥,进一步危害企业安全。由于漏洞已被积极利用,全球多个安全机构已发出紧急警告。企业应立即评估其SharePoint服务器的安全性,并应用最新的安全补丁以防止潜在的攻击。

产品厂商: Microsoft

产品名称: SharePoint Server

影响版本: 2016, 2019, and Subscription Edition

来源: https://github.com/Sec-Dan/CVE-2025-53770-Scanner

类型: CVE-2025:github search

仓库文件

  • .gitattributes
  • README.md
  • requirements.txt
  • spScanner.py
  • splash.txt

来源概述

CVE-2025-53770 Scanner by DanSec

A simple, effective reconnaissance tool to identify potential exposure to the critical SharePoint vulnerability CVE-2025-53770.

[!Warning]

This tool is intended for authorised testing purposes only.
The author (DanSec) takes no responsibility for misuse or damage caused by unauthorised scanning or usage. Ensure you have explicit permission to scan any domain or service before using this tool.

About CVE-2025-53770

CVE-2025-53770 (“ToolShell”) is a critical vulnerability affecting on-premises SharePoint Server versions 2016, 2019, and Subscription Edition.

It enables unauthenticated remote code execution (RCE) via:

  • Authentication bypass by header spoofing (CVE-2025-53771)
  • Upload of a malicious ASPX web shell (spinstall0.aspx)
  • Extraction of cryptographic secrets from web.config
  • Unsafe deserialization exploiting ViewState to execute code remotely

This vulnerability has been actively exploited, prompting urgent warnings from authorities worldwide.

For detailed information:


What Does This Scanner Do?

  • Performs subdomain enumeration (using Sublist3r and crt.sh) to identify potential SharePoint hosts.
  • Safely checks each discovered subdomain for signs of vulnerability to CVE-2025-53770.
  • Outputs results in a structured CSV file for easy review.

This scanner DOES NOT exploit the vulnerability. It merely identifies potential points of exposure.


Installation

Clone the repository and install dependencies:

1
2
3
git clone https://github.com/Sec-Dan/CVE-2025-53770-Scanner.git
cd CVE-2025-53770-scanner
pip install -r requirements.txt

Usage

1
python spScanner.py <target_domain> [options]

Example:

1
python spScanner.py example.com --threads 5 --retries 2

Available Flags

Flag Description Default
<target_domain> Root domain to scan (required) -
-o, --output CSV output filename CVE-2025-53770_output.csv
--passive Run a passive scan (skip subdomain enumeration) Disabled
--threads Number of concurrent scan threads 1
--retries Number of retries per host 1
--rate-limit Max requests per second (0 for unlimited) 0

Interpreting Results

  • VULNERABLE (Red): HTTP 200 OK responses, potentially vulnerable
  • CLEAN (Green): Other HTTP responses, likely not exposed
  • ERRORS (Yellow): Connection or network errors

The resulting CSV file will contain detailed status for each scanned subdomain.


Responsible Usage

  • Always obtain explicit authorization before scanning.
  • Inform stakeholders before initiating scans, especially in sensitive environments.
  • Use only on systems you own, manage, or have explicit consent to test.

Issues & Contributions

Found a bug or have a feature request? Open an issue or pull request!

Stay safe, and happy scanning!
DanSec


SharePoint Server Remote Code Execution Vulnerability
http://example.com/2025/07/22/github_1826879622/
作者
lianccc
发布于
2025年7月22日
许可协议