关联漏洞
介绍
Recreation of the SharePoint PoC for CVE-2023-29357 in C# with lots of help from ChatGPT.
Build with .Net Version 4.7.2 in Visual Studio 2017
Use NuGet Package manager to install any missing packages
Yara rules for detection below
Usage:
```
CVE-2023-29357.exe http(s)://yoursharepoint.lol [-v]
```

Huge shoutout to:
[Jang](https://twitter.com/testanull) for being very supportive with explainations on exploit steps and his huge writeup:
https://testbnull.medium.com/p2o-vancouver-2023-v%C3%A0i-d%C3%B2ng-v%E1%BB%81-sharepoint-pre-auth-rce-chain-cve-2023-29357-cve-2023-24955-ed97dcab131e
[WhiteKnight](https://twitter.com/Chocapikk_) for his support and the Python exploit:
https://github.com/Chocapikk/CVE-2023-29357
[Florian Roth](https://twitter.com/cyb3rops) for his immediate efforts to provide YARA rules to help you protect against the usage of the current exploits:
https://twitter.com/cyb3rops/status/1707678149448700270
https://github.com/Neo23x0/signature-base/blob/master/yara/expl_sharepoint_cve_2023_29357.yar
文件快照
[4.0K] /data/pocs/0bdadb1117f3449231797f81134f4fce10b1dec9
├── [4.0K] CVE-2023-29357
│ ├── [1.7K] App.config
│ ├── [6.9K] CVE-2023-29357.csproj
│ ├── [1.4K] packages.config
│ ├── [ 16K] Program.cs
│ └── [4.0K] Properties
│ └── [1.4K] AssemblyInfo.cs
├── [1.1K] CVE-2023-29357.sln
└── [1.1K] README.md
2 directories, 7 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。