关联漏洞
标题:
Microsoft WebDAV 安全漏洞
(CVE-2025-33053)
描述:Microsoft WebDAV是美国微软(Microsoft)公司的一种基于HTTP协议的扩展,用于通过互联网进行文件管理和协同编辑。 Microsoft WebDAV存在安全漏洞。攻击者利用该漏洞可以执行代码。以下产品和版本受到影响:Windows 11 Version 24H2 for ARM64-based Systems,Windows 11 Version 24H2 for x64-based Systems,Windows Server 2025,Windows 10 for 32-bit
描述
Proof-of-Concept for CVE-2025-33053 Exploiting WebDAV with .url file delivery to demonstrate realistic remote code execution. Includes a decoy PDF payload and a video-only showcase of potential command-and-control capabilities.
介绍
# CVE-2025-33053 - WebDAV Remote Code Execution (RCE) PoC & C2 Simulation
> **⚠️ Educational Purposes Only**
> This project demonstrates a proof-of-concept exploiting WebDAV and `.url` file delivery to achieve realistic remote code execution. It includes a decoy-based executable and a controlled simulation of command-and-control (C2) capabilities. No malicious payloads are shared.
---
## 📜 Summary
This repository contains a PoC for **CVE-2025-33053**, a vulnerability in how Windows handles `.url` files pointing to a WebDAV share. The PoC demonstrates how an attacker could:
* Deliver a `.url` shortcut via ZIP (`Invoice.pdf.zip`)
* Trigger execution of a payload hosted on a WebDAV container
* Open a benign-looking PDF while executing malicious logic in the background
* Optionally simulate C2 behavior (e.g., creating folders)
> The actual C2 code is **not included** only a demonstration video is provided.
---
## 🎬 Demo Videos
### 🔹 Video 1 — Decoy Execution
https://github.com/user-attachments/assets/27ada7f9-9b02-4281-b002-da7afcdffe21
Shows the `.url` file triggering `route.exe`, which opens a fake PDF and displays a popup:
> *"Execution complete. No alerts triggered. You may continue pretending you're safe."*
### 🔹 Video 2 — C2 Simulation
https://github.com/user-attachments/assets/d3908eb7-3126-4ec1-ae60-a0373b877a50
Very simple command and control mechanism. Simulates a stealthy C2 by executing remote commands (e.g., creating a folder and calc) fetched via HTTP. No shell, no noise just silent control.
Reverse shells get captured and stopped by the Microsoft Defender. Here as you can see I just edit a file which is accessible to the victim machine and it will be fetched by the machine via http; strip the content then executed. that task is handled by that custom Route.exe
> ✅ Videos available in the `demo/` directory.
---
## 📂 File Structure
```
CVE-2025-33053/
├── docker-compose.yml # WebDAV container config
├── setup_webdav_payload.py # Automates setup + zipping
├── Important-Document.pdf.zip # Contains disguised .url ( After the script )
├── webdav_data/ # ( After the script )
│ └── data/payload/route.exe # Payload (PDF + logic)
├── cleanup.sh # Docker + Directories + webdav_data cleaner
├── demo/
│ ├── 1_decoy_execution.mp4
│ └── 2_c2_simulation.mp4
```
---
## 🧪 Running the PoC
1. **Clone the repo & navigate to it**
```bash
git clone https://github.com/kra1t0/CVE-2025-33053-WebDAV-RCE-PoC-and-C2-Concept.git
cd CVE-2025-33053-WebDAV-RCE-PoC-and-C2-Concept
```
2. **Run setup script**
```bash
python3 setup_webdav_payload.py
```
> This sets up Docker, creates folders, Moves the pwned.exe, generates `.url`, and packages the `.zip`
4. **Deliver the ZIP and open on target**
* `Invoice.pdf.zip` → user opens / Unzips and double-clicks `.url`
* Execution begins from WebDAV without any warnings
( Sometimes the Microsoft Defender does alert you that this file should be scanned by the admin. )
---
## 🧱 Affected Versions
CVE-2025-33053 affects the following Windows versions:
Windows 10 (1809 – 22H2)
Windows 11 (21H2 – 23H2)
Windows Server 2016 / 2019 / 2022
Systems with WebClient service enabled
Systems where .url files are not blocked or sanitized
**🛠️ The vulnerability was patched in June 2025 cumulative updates.
You can find [patch links](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053) in the Microsoft Patch Notes.**
## 🧠 How It Works
1. **The Shortcut Trick** The `.url` file launches a trusted Windows utility (`iediagcmd.exe`) but sets its working directory to an attacker-controlled WebDAV share.
2. **DLL/Executable Hijack** That utility uses `Process.Start()` to run commands like `route.exe`. Windows looks first in the working directory, allowing the malicious binary from WebDAV to be executed.
3. **Stealth Falcon’s Delivery** In real attacks, APT actors zipped the `.url` into misleadingly named archives (e.g. `...pdf.zip`) and hosted them on trusted domains over HTTPS. The payload chain then delivered a decoy PDF and loaded a custom C2 loader (“Horus Agent”) capable of in-memory shellcode injection, process cloaking, and remote commands.
4. **Active Exploitation.** The exploit was used in March 2025 against defense organizations in the Middle East. It’s high-impact (CVSS 8.8) and included in CISA’s Known Exploited Vulnerabilities catalog.
---
## 🛡️ Mitigation & Defense
| Mitigation Strategy | Description |
| ----------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------- |
| **🔄 Apply Microsoft Patch** | June 2025 cumulative updates address CVE‑2025‑33053 across Windows 10/11 and older Server versions. |
| **🔒 Disable WebDAV Client** | For systems without WebDAV needs (i.e. most modern setups), disable the “WebClient” service via Group Policy or registry. |
| **📥 Train Users to Avoid Suspicious Archives** | Don’t open `.url` files from ZIP/ISO emails, even if they appear document-like. |
| **🕵️♀️ Monitor WebDAV Traffic** | Look for outbound UNC connection patterns like `\\<host>@443\DavWWWRoot\...` these may indicate exploitation attempts. |
| **🛠 Deploy WAF/IDS Rules** | Block WebDAV-related methods (e.g., `PROPFIND`) or UNC paths to untrusted domains. |
| **⚙️ Harden Edge/SmartScreen Policies** | Restrict handling of `.url` files and archives via browser settings or secure email gateways. |
> ✅ **Immediate priority**: install the patch — CISA requires federal agencies to remediate by July 1, 2025
---
## ❌ What’s NOT Included
* No C2 command server code
* No reverse shell scripts or malware
* No exploitation of real systems
---
## 🔗 References
* [Microsoft Patch Notes – June 2025](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053)
* [CISA KEV Catalog](https://www.cisa.gov/known-exploited-vulnerabilities-catalog)
* [Elastic Threat Report: Stealth Falcon Exploitation](https://www.elastic.co/blog/stealth-falcon-campaign-2025)
* [CERT-EU Alert](https://cert.europa.eu/article/webdav-url-hijack-apt)
* [Microsoft Defender AV & SmartScreen Advisory](https://learn.microsoft.com/en-us/microsoft-365/security/)
---
Crafted with attention to realism, red team tradecraft, and ethical disclosure by [@kra1t0](https://github.com/kra1t0)
*Precision in Chaos*
文件快照
[4.0K] /data/pocs/051891296626677ad2656a3ca3ac69fc81370746
├── [ 218] cleanup.sh
├── [4.0K] demo
│ ├── [2.1M] 1_decoy_execution.mkv
│ └── [6.2M] 2_c2_simulation.mkv
├── [ 566] docker-compose.yml
├── [7.1M] pwned.exe
├── [6.8K] README.md
└── [2.2K] setup_webdav_payload.py
1 directory, 7 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。