Microsoft SharePoint Insecure Deserialization Vulnerability
漏洞信息
漏洞名称: Microsoft SharePoint Insecure Deserialization Vulnerability
漏洞编号:
- CVE: CVE-2025-53770
漏洞类型: 反序列化
漏洞等级: 高危
漏洞描述: ### 受影响产品
Microsoft SharePoint 是一款广泛使用的企业级协作平台,支持文档管理、团队协作和内容共享。它通常部署在企业内部网络或云环境中,用于提高团队的工作效率和信息共享。由于其广泛的应用,SharePoint 成为了攻击者的重要目标。
漏洞解释
该漏洞(CVE-2025-53770)属于反序列化漏洞,具体发生在 SharePoint 的 ToolPane.aspx
端点。攻击者可以通过发送特制的 base64+gzip 编码的 ViewState 载荷,触发不安全的反序列化过程。这种漏洞的根本原因在于 SharePoint 在处理 ViewState 数据时,未能正确验证和过滤用户输入,导致攻击者可以反射内部序列化对象,进而可能导致敏感数据泄露或远程代码执行(RCE)。
影响分析
此漏洞的严重性被评定为高危,因为它可能导致远程代码执行或敏感数据泄露。攻击者无需认证即可利用此漏洞,且可以通过自动化工具进行大规模扫描和攻击。由于 SharePoint 通常存储大量敏感企业数据,成功利用此漏洞可能导致严重的数据泄露、服务中断甚至企业网络被完全控制。因此,建议所有使用 SharePoint 的组织尽快检查并修复此漏洞,以防止潜在的安全风险。
产品厂商: Microsoft
产品名称: SharePoint
来源: https://github.com/0x-crypt/CVE-2025-53770-Scanner
类型: CVE-2025:github search
仓库文件
- .gitignore
- CVE-2025-53770_Scanner.py
- LICENSE
- README.md
来源概述
🛡️ CVE-2025-53770 SharePoint Vulnerability Scanner
A Python-based tool to detect vulnerable Microsoft SharePoint instances affected by CVE-2025-53770, an insecure deserialization vulnerability triggered via the ToolPane.aspx
endpoint. The scanner sends a crafted, compressed ViewState payload to determine if the target leaks internal serialized objects.
🚀 Features
- ✅ Detects SharePoint instances vulnerable to CVE-2025-53770
- ✅ Supports scanning a single target or bulk URLs from a file
- ✅ Uses a safe
Scorecard:ExcelDataSet
test payload - ✅ Decodes and decompresses reflected base64+gzip ViewState data
- ✅ Minimal dependencies and works with standard tools (
curl
,base64
,gzip
) - ✅ Colored CLI output for easy identification
📖 CVE Details
- CVE: CVE-2025-53770
- Component: Microsoft SharePoint (
ToolPane.aspx
) - Vulnerability Type: Insecure Deserialization / Unsafe ViewState Reflection
- Severity: High – May lead to sensitive data disclosure or remote code execution (RCE)
- Test Marker:
IntruderScannerDetectionPayload
,ExcelDataSet
,divWaiting
,ProgressTemplate
,Scorecard
🧑💻 Usage
1 |
|
https://intranet.company.com
https://sharepoint.university.edu
https://portal.corporate.net
1 |
|
🔍 Sample Output
1 |
|
📝 License
This project is licensed under the MIT License.
👤 Author
Ahmed Tamer
Cybersecurity Researcher | Bug Hunter | Red Teamer
⚠️ Ethical Disclaimer
This tool is developed for educational and authorized security testing purposes only.
You are not allowed to use this tool against systems you do not own or lack explicit permission to test.
Misuse of this software may result in criminal charges — use responsibly and ethically.
1 |
|