# Microsoft SharePoint 伪造漏洞
## 概述
Microsoft Office SharePoint 存在路径遍历漏洞,攻击者可利用此漏洞绕过目录限制,执行欺骗攻击。
## 影响版本
未明确具体版本,建议检查微软官方更新及补丁信息。
## 细节
漏洞是由于对路径名未正确限制,导致攻击者可通过构造特殊路径访问或操作受限目录中的文件。
## 影响
未经授权的攻击者可借助网络进行路径遍历攻击,造成文件访问或篡改风险,从而影响系统的安全性与数据完整性。
                                        
                                    
                                | # | POC 描述 | 源链接 | 神龙链接 | 
|---|---|---|---|
| 1 | Microsoft Office SharePoint Server contains an improper authentication vulnerability that allows unauthorized attackers to perform spoofing over a network. By crafting a POST request to /_layouts/15/ToolPane.aspx with a forged Referer header (/_layouts/SignOut.aspx), attackers can bypass authentication mechanisms and gain unauthorized access to protected endpoints. This vulnerability is part of the ToolShell exploit chain and is a patch bypass for CVE-2025-49706. When chained with CVE-2025-53770 (deserialization vulnerability), it enables unauthenticated remote code execution on SharePoint Server. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-53771.yaml | POC详情 | 
标题: CVE-2025-53771 - Security Update Guide - Microsoft - Microsoft SharePoint Server Spoofing Vulnerability -- 🔗来源链接
标签: vendor-advisory
神龙速读暂无评论