POC详情: 620c0e343c96dbdafcc100145aae29510adb80af

来源
关联漏洞
标题: Microsoft WebDAV 安全漏洞 (CVE-2025-33053)
描述:Microsoft WebDAV是美国微软(Microsoft)公司的一种基于HTTP协议的扩展,用于通过互联网进行文件管理和协同编辑。 Microsoft WebDAV存在安全漏洞。攻击者利用该漏洞可以执行代码。以下产品和版本受到影响:Windows 11 Version 24H2 for ARM64-based Systems,Windows 11 Version 24H2 for x64-based Systems,Windows Server 2025,Windows 10 for 32-bit
描述
POC exploit for CVE-2025-33053 (External control of file execution path in URL file)
介绍
# CVE-2025-33053 POC Exploit

## Overview 

The working directory in a .url file can be set to a foreign WebDAV server. When opened by a Windows client, dependencies for the executable defined in the URL field are searched for in the foreign WebDAV share. If an arbitrary executable or DLL is given the same name as one of these dependencies, it is loaded and executed by the Windows client. In the case of this POC, the URL is set to the Internet Explorer diagnostices executable "iediagcmd.exe" local to the Windows client. iediagcmd.exe subsequently calls a few different executables, one of which is "route.exe". By giving an arbitrary binary such as a shellcode loader the same name and sharing it on the WebDAV server pointed to in the "WorkingDirectory" variable of the .url file, the Windows client will load and execute it when the URL file is opened. 


## Setup

1. Run `sudo bash webdav_setup.sh` to configure and run an Apache2 WebDAV server from a Linux host (or set up one yourself).

2. Place an executable such as a shellcode loader named "route.exe" in the WebDAV share.

3. Modify the URL file to point to the domain name or IP address of the WebDAV server.

4. Serve the URL file to a Windows client through some kind of pretense that gets it to be run by a user.

5. If using a payload that triggers a C2 callback, route.exe might never return. iediagcmd.exe opens a windows that waits for the command to finish, so execute the command `taskkill /f /im iediagcmd.exe` to kill the original iediagcmd process window on the client.


## Caveats

- Windows Defender will generally let the url file open without problems, but the route.exe executable will be scanned and needs to have a clean signature.
- This CVE was fixed in a June 2025 patch tuesday update.


文件快照

[4.0K] /data/pocs/620c0e343c96dbdafcc100145aae29510adb80af ├── [ 265] doc.url ├── [1.7K] README.md └── [1.5K] webdav_setup.sh 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。